/ Most Viewed

Exploiting Video Console Chat for Cybecrime or Terrorism

A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more

Abuse Reporting: Names vs Numbers

For email usage, abuse reporting requires cooperation between senders and receivers. That's why RFC 5965 specified a standard format for it. However, Wikipedia lists only 18 feedback providers today. It is often said that the number of legitimate mailbox providers in the world is rather small, possibly some hundreds of thousands, but certainly more than that. more

Brexit Likely to Pause U.K. Data Center Build-outs

Could Brexit spell turbulence for cloud computing? Larry Dignan reporting in ZDNet: "Get ready for the pause in U.K. data center build-outs. The only certainty about the United Kingdom's move to exit the European Union is the cloud computing ecosystem is going to see some turbulence and uncertainty ahead. more

Audio Recording from the “Power, Privacy, and the Internet” Conference

On October 30 – 31, 2013, The New York Review of Books held a conference called "Power, Privacy, and the Internet," taking a look at the role of the Internet both as a vehicle of political and cultural dissent and, in the hands of the state, as a weapon of repression and control. The recordings from the event have recently been released where listeners can stream or download the audio. more

WIPO Updates GDPR Guidance for UDRP

Three months after implementation of the European Union's (EU) General Data Protection Regulation (GDPR), the World Intellectual Property Organization's (WIPO) Arbitration and Mediation Center has expanded and updated its already helpful web page with important questions and answers about how the GDPR is impacting the Uniform Domain Name Dispute Resolution Policy (UDRP). more

The Life Cycle of Digital Certificates Reduces Again

Recently, there were news articles about a large software provider who experienced a global outage due to an expired digital certificate - and this is not the first time this kind of issue has hit the news. Digital certificate outages, when an organization forgets to replace an expiring certificate for a business-critical domain name, continues to cause business disruption and security risks. more

Watching the Watchers Watching Your Network

It seems that this last holiday season didn't bring much cheer or goodwill to corporate security teams. With the public disclosure of remotely exploitable vulnerabilities and backdoors in the products of several well-known security vendors, many corporate security teams spent a great deal of time yanking cables, adding new firewall rules, and monitoring their networks with extra vigilance. more

Bandwidth Buyers Face Significant Price Differences in the Global Market

According to Data from TeleGeography's Wholesale Bandwidth Pricing Database, there are stark price differences around the globe for companies with large international bandwidth requirements. "For example, the median price of a 2 Mbps E-1 circuit between London and Johannesburg in Q4 2008 was nearly $15,000. For the same price, a bandwidth buyer could lease a 10 Gbps wavelength -- 500 times the capacity of an E-1 -- between London and New York." more

Facebook Introduces Open/R as a More Efficient Modular Routing Platform

Facebook has announced a new routing system aimed at solving fast-recovery challenges for its Terragraph network that brings high-speed internet connectivity to dense urban areas. more

The Long-Run Effect of Cuba’s Recent Internet-Augmented Protests

It’s now more than 6 weeks since the Cuban political protests and accompanying Internet service disruption. Will they lead to a long-run change in the Cuban Internet or the Cuban political situation? Let’s start with the Cuban Internet. Many of the Internet changes during the protests have disappeared. Total daily traffic, the ratios of mobile to fixed traffic, and human to automated posts, and the proportion of blocked Signal sessions are about what they were before the protests. more

Counting Gigabit Households

I ran across a website called the Gigabit Monitor that is tracking the population worldwide that has access to gigabit broadband. The website is sponsored by VIAVI Solutions, a manufacturer of network test equipment. The website claims that in the US, over 68.5 million people have access to gigabit broadband or 21% of the population. That number gets sketchy when you look at the details. more

The Impact of Satellite Broadband

Recently I've had several people ask me about the expected impact of low-orbit satellite broadband. While significant competition from satellites is probably a number of years away, there are several major initiatives like StarLink (Elon Musk), Project Kuiper (Amazon), and OneWeb that have announced plans to launch swarms of satellites to provide broadband. more

Scientists Transmit Terabits Per Second Through Air, May Replace Undersea Cables

Scientists from ETH Zurich and their European partners have demonstrated a groundbreaking capability for transmitting several tens of terabits per second, despite considerable air turbulence. This feat was accomplished with lasers over a distance between the Jungfraujoch mountain peak and the city of Bern in Switzerland. The technology could potentially eliminate the need for expensive undersea cables, currently forming the backbone of the Internet. more

Suggestions on IDN Variant Management

To some applicants, ICANN's variant management policy in DAG4 has become a big obstacle to the new generic Top-Level Domain (gTLD) application. The policy is to delegate the string while reserving the variants, and these variants will not be delegated until a sound mechanism is developed and the desired variants are evaluated. But for some languages, Chinese for example, the so called string and its variant, namely simplified Chinese and traditional Chinese, are equivalent and must be simultaneously delegated. more

Carriers Are No Longer Operators

The classic view of a wireline or mobile carrier is that it was an "operator", it ran out cables, raised poles, installed switches, constructed central offices and base stations and the like. However, the figures from Nokia Siemens Networks (NSN) show that firm is making 45% of its sales from services, meaning it is constructing and managing networks on behalf of "carriers". NSN is "carrying" a lot of telecoms traffic. This has been accelerated by the global financial crisis... more