The attack began Tuesday afternoon, and continued for two days straight, according to a source close to Russia’s Central Bank quoted by RIA Novosti. Sberbank confirmed the DDoS attack on its online services. more
As AI systems take on critical roles in telecommunications, global regulatory frameworks remain outdated and fragmented, leaving essential infrastructure vulnerable to novel risks that current laws on cybersecurity and data protection fail to address. more
As you've probably read, WikiLeaks has released a trove of purported CIA documents describing their hacking tools. There's a lot more that will be learned, as people work their way through the documents. For now, though, I want to focus on something that's being misreported, possibly because of deliberately misleading text by WikiLeaks itself. Here's the text from WikiLeaks... more
In World of Ends, Doc Searls and Dave Weinberger enumerate the Internet's three virtues: 1. No one owns it. 2. Everyone can use it. 3. Anyone can improve it. ... Online services and interactions are being held back by the lack of identity systems that have the same virtues as the Internet. This post describes what we can expect from an Internet for identity. more
The impact of new generic Top-Level Domains on the price of existing gTLDs and ccTLDs is likely to be limited, Tim Schumacher, CEO of leading domain name marketplace Sedo, told the the Domain Pulse conference in Vienna, held on 17 and 18 February. "I don't think the new gTLDs will have a major impact on pricing of existing TLDs. If you start a company or a product, you will always need to have your 'dotcom' or respective ccTLD in the market you operate in," said Schumacher in an interview following the conference. more
With more than 100 countries now involved in the rollout of FttH there is increased evidence that commercial demand exists for this infrastructure. In developed economies FttH demand will, over the next 5 years, grow to between 30%-50% of the population. Competition aimed at the top end of this market will trigger a broader rollout. A Bernstein study of Google's rollout of FttH in Kansas City concluded that the penetration measured by them was much higher than they had expected. more
Do you have ideas about DNSSEC or DANE that you would like to share with the wider community? Have you created a new tool or service? Have you found a way to use DNSSEC to secure some other service? Do you have new statistics about the growth or usage of DNSSEC, DANE or other related technology? If so, and if you will be in Johannesburg, South Africa, for ICANN 59 in June 2017 (or can get there), please consider submitting a proposal to speak at the ICANN 59 DNSSEC Workshop! more
ICANN introduced a requirement for domain name registrars to send out annual notices to all their customers (registrants) to check the Whois on their domain names to ensure the information is correct. While this seemed fairly reasonable (if cumbersome), the fact is it confuses the heck out of people -- and creates a whole lot of confusion for registrants. But that was a problem we could deal with. Fast-forward to October, 2008... more
As we all know by now, last week, on Thursday, August 7, Twitter was hit with a denial-of-service attack that took it down for several hours. Other social networking sites like Facebook, LiveJournal, Youtube and Blogger were also hit. They managed to repel the attack although Facebook was not quite as successful as the other larger players. The theory floating about at the moment is that this was a politically oriented play designed to target one guy: a blogger. We are nearing the 1-year anniversary of a the Russian/Georgian 2008 war. There is a pro-Georgian blogger by the username of "Cyxymu" who had accounts on all of these services. more
In an open letter published today, Google has asked the U.S. Attorney General and the Federal Bureau of Investigation for more transparency regarding national security request data in light of the NSA data collection controversy. more
David Akin pointed me to this article in the Ottawa Citizen which describes CRTC initiatives aimed at getting the cablecos to pay into a fund that would support, "the creation of high-quality, high-cost, scripted Canadian broadcasting content in the new media." In it, Ken Engelhart, senior vice-president of regulatory [affairs?] for Rogers Corp. is quoted saying... more
President Obama began working on Cuban rapprochement during his 2009 presidential campaign. After over five years of thought and negotiation, the Whitehouse announced a major shift in Cuba policy, which included allowing telecommunications providers "to establish the necessary mechanisms, including infrastructure, in Cuba to provide commercial telecommunications and Internet services, which will improve telecommunications between the United States and Cuba." more
The recent declaration from the UK’s minister for communications that the Internet should be tiered, thereby allowing ISPs to charge for prioritised traffic (either rated by speed delivered or by content provider) is a knee-jerk response to network strain masking as a necessary network management tool, and is a potential threat to the concept of net neutrality. ...developments in the mobile data sector make it clear that capacity constraints are appearing on mobile networks as well, long before the anticipated launch of LTE-based services in the UK in 2013. more
As we passed five years since the Internet Assigned Numbers Authority transition took place, my co-authors and I paused to look back on this pivotal moment; to take stock of what we've learned and to re-examine some of the key events leading up to the transition and how careful planning ensured a successful transfer of IANA responsibilities from the United States Government to the Internet Corporation for Assigned Names and Numbers. more
We knew that Usenet needed some sort of management system, and we knew that that would require some sort of authentication, for users, sites, and perhaps posts. We didn't add any, though -- and why we didn't is an interesting story. The obvious solution was something involving public key cryptography, which we (the original developers of the protocol: Tom Truscott, the late Jim Ellis, and myself) knew about: all good geeks at the time had seen Martin Gardner's "Mathematical Games" column... more