Microsoft is shipping a patch to eliminate SHA-1 hashes from its update process. There's nothing wrong with eliminating SHA-1 - but their reasoning may be very interesting. SHA-1 is a "cryptographic hash function". That is, it takes an input file of any size and outputs 20 bytes. An essential property of cryptographic hash functions is that in practice (though obviously not in theory), no two files should have the same hash value unless the files are identical. more
Internet service in and around Mogadishu, Somalia suffered a crippling blow recently as the East African Submarine System (EASSy) cable, which provides service to the area, was cut by the anchor of a passing ship. The government of Somalia estimated that the impact of the submarine cable cut was US$10 million per day and detained the MSC Alice, the cargo vessel that reportedly caused the damage. more
This study analyzes the differences in domain name and IP address strategies among a number of current mainstream artificial intelligence (AI) service providers. We find that these technical choices not only reflect deployment decisions but also deep-seated corporate knowledge and capabilities in Internet infrastructure service provision, as well as brand positioning and market strategies. more
ICANN has released a set of guidelines to explain its Coordinated Vulnerability Disclosure Reporting. The guidelines serve two purposes, says ICANN: "They define the role ICANN will perform in circumstances where vulnerabilities are reported and ICANN determines that the security, stability or resiliency of the DNS is exploited or threatened. The guidelines also explain how a party, described as a reporter, should disclose information on a vulnerability discovered in a system or network operated by ICANN." more
Massive distributed denial of service (DDoS) attacks against ISPs and their customers have almost doubled over the past year, according to a new security report. Attacks on networks making them unavailable to intended users -- also known as distributed denial of service (DDoS) attacks -- exceeded 40 gigabits in the last year according to Arbor Networks' annual survey of ISPs from North America, South America, Europe and Asia. more
The U.S. Sate Department annual human rights report released on Friday has expressed concerns over the increasing trend among governments spending more time, money and attention in efforts to control their citizens access to the Internet and other communication means. To aid people seeking to speak out, the U.S. government is helping to finance circumvention technologies to avoid firewalls, reports the Associated Press. "To deal with governments hacking computers or intimidating dissenters, the U.S. government has trained 5,000 people from around the world on how to leave less of a trace on the Internet." more
Elon Musk has attributed a series of major disruptions on X, the social media platform he owns, to a large-scale cyberattack. The outages, which persisted for several hours today (and are still ongoing), left users unable to access the service, triggering a flurry of speculation. more
Late last year, the U.S. Federal Trade Commission - the governmental arm responsible for protecting Americans from unfair trade practices -- opened a comment period on a proposed "Trade Regulation Rule on Impersonation of Governments and Businesses." It's no surprise that those who are victims of or are battling online impersonation saw this as an opportunity to highlight the importance of a working domain name registration data system ("WHOIS") ... more
There was an interesting phenomenon that happened in September when Starlink launched 49 new satellites. The satellites were successfully deployed by the rocket, but as the satellites were being maneuvered to reach the final orbital slots, there was a geomagnetic storm that caused 38 of the satellites to fall back to earth. Space storms happen when radiation affects the magnetosphere that surrounds the earth. more
The October 2014 edition of the Afnic Industry Report on Domain Names is out with focus on the impact of the hundreds of new TLDs on "traditional" players. The October 2014 issue shows that gTLDs (.com, .biz., etc.) are impacted by the massive influx of new TLDs on the market whereas ccTLDs (.fr, .re, ...) are better resisting the newcomers. more
The suggestion was recently put to the GNSO Council: anyone who becomes a member of a proposed new Expedited Policy Development Process (EPDP) must be able to demonstrate that they have basic knowledge of privacy and data protection. This makes a lot of sense: Would you trust a lawyer who had never been to law school? Or a doctor who had never studied medicine? Of course not. Recently I asked members of our ICANN Community: have you had any GDPR training, classes, or certification? more
With just a little more than three months left in 2016, the number of domain name disputes filed at the World Intellectual Property Organization (WIPO) appears to be headed for a record year. According to public data published on the WIPO website, the current number of domain name disputes filed this year (as of this writing, September 27, 2016) is 2,228 - which would indicate that the total might reach 3,011 cases by December 31. more
First the Los Angeles Times, now the New York Times have both printed editorials critical of the PROTECT-IP bill. Both the LAT and NYT support copyright - and announce as much in their opening sentences. That doesn't mean we should sacrifice Internet security and stability for legitimate DNS users, nor the transparency of the rule of law. more
In a joint letter sent to ICANN on Monday, a group of non-profit organizations has opposed the removal of price caps in the .org Registry Agreement. more
It is not much of an exaggeration to say that the Digital Millenium Copyright Act of 1998 makes the Internet as we know it possible. The DMCA created a safe harbor that protects online service providers from copyright suits so long as they follow the DMCA rules. One of the rules is that the provider has to register with the Copyright Office to designate an agent to whom copyright complaints can be sent. The original process was rather klunky; send in a paper form that they scan into their database, along with a check. more