/ Most Viewed

Catalan Government Claims Spanish Online Censorship Breaching EU Laws

The Catalan government has written to the European Commission claiming that the Spanish government is in breach of EU law. In a letter from Jordi Puigneró Secretary of Telecommunications, Cybersecurity and the Digital Society at the Government of Catalonia addressed to Andrus Ansip, European Commissioner for Digital Economy and Society, the Catalan government calls out the moves by the Madrid government as censorship. more

The Internet and the Cloud Are Going Into Space

Unlike Bezos and Branson, they're going to stay there. Today we have space-based internet access and a terrestrial internet; within ten years, we'll have a space-based internet. Internet traffic will travel more miles in space than on terrestrial fiber. By that time, the great cloud data centers of Google, Amazon, Microsoft, and their competitors and successors will mostly be in orbit as well. Five years from now, this transition will be obvious, accepted, and well underway... more

IP Address Information Misused by Authorities Says EFF, Not Enough to Justify Police Raids

"Law Enforcement, Courts Need to Better Understand IP Addresses, Stop Misuse," says EFF in whitepaper released on Thursday. more

Hong Kong Billionaire Richard Li Becomes First Person to Own a TLD Matching His Name

The new top-level domain (TLD) .richardli secured for the Hong Kong billionaire Richard Li went live on the internet today. Kevin Murphy reporting in Domain Incite: "The registry is Pacific Century Asset Management (HK) Limited, a subsidiary of PCCW, the Hong Kong telecomms and internet giant of which Li is chair... The gTLD is a pure brand-protection play, according to the 2012 application" more

Our Vision for Advancing and Growing the Domain Industry

ICANN 54 is upon us, and to commemorate it, we've got www.dublin.pub loaded up with friendly places to network, take advantage of the city's comedy and music scene, and possibly even enjoy a pint. With so many issues to discuss and address this week, a .PUB address wouldn't be the appropriate destination for the entire conference, but for a microsite discussing the cultural and social opportunities that Dublin has to offer, we happen to think it's perfect, especially in the place that gave the world the Irish pub. more

IETF Looking at Technical Changes to Raise the Bar for Monitoring

During a speech last week at the Internet Governance Forum in Bali, Jari Arkko, IETF's chair, re-emphasized it's efforts to ramp up online security in light of recent revelations of mass internet surveillance. "Perhaps the notion that internet is by default insecure needs to change," Arkko said. Significant technical fixes "just might be possible." more

Internet Society Releases Paper on “What Really Matters About the Internet”

Internet Society has released a paper today highlighting the importance of understanding what is important and unchanging about the Internet. more

New TLD Public Comments: Jumping-to-Conclusions?

Having been involved in the whole TLD issue since its inception, back in the ancient history of the mid-1990's, one would think that nothing would surprise me anymore. As it turns out, however, watching the comments on ICANN's public comment list with respect to the new sTLD proposals, I find that I'm taken-back by some of the kinds of comments I'm seeing. more

After ICANN’s TLD Application System Glitch, Communication Is the Key

There were long faces all over the new gTLD ecosystem yesterday -- applicants, consultants and technical operators alike -- when ICANN took their Application System (TAS) offline and announced that it would not be brought back up for 5 days. As a result, the long-anticipated close of the first new gTLD application window was pushed back from April 12 to April 20, 23:59 UTC. You could almost hear the groans of dismay spreading over social cyberspace! more

Site Finder: The Technical, Legal & Privacy Concerns

It is openly admitted , in the same Implementation PDF file, that all accesses to the Site Finder service are monitored and archived. A further worry for users is the privacy policy and terms of service posted on the Site Finder service. Not only does the simple act of mistyping a URL implicitly cause you, the end user, to accept VeriSign's Terms of Service and Privacy Policy without the chance to review and accept or decline either, but critical information as described above is not disclosed in either policy (as of this writing). The Privacy Policy clearly states... more

European Commission Pushes IPv6 Forward

The European Commission has released a communication on IPv6, in time for the IPv6 Day in Brussels next 30th May. It goes in the same direction as the report presented at the OECD Ministerial meeting on "Future of the Internet Economy", that was held in Seoul, Korea earlier this month. At the same time, the Commission committed to make its own web services available on IPv6 by 2010. It is good to see that intergovermental organizations take the lead on this, after 10 years of failure of the private sector to actually deploy IPv6... more

Developing Internet Standards: How Can the Engineering Community and the Users Meet?

There is currently a discussion going on between Milton Mueller and Patrik Fältström over the deployment of DNSSEC on the root servers. I think the discussion exemplifies the difficult relation between those who develop standards and those who use them. On the one hand, Milton points out that the way the signing of the root zone will be done will have a great influence on the subjective trust people and nation states will have towards the system. On the other hand, Patrik states that "DNSSEC is just digital signatures on records in this database". Both are right, of course, but they do not speak the same language... more

Another Try at Proof-of-Work e-Postage Email

Another paper from the Fifth Workshop on the Economics of Information Security, (WEIS 2006) is Proof of Work can Work by Debin Liu and L, Jean Camp of Indiana University. Proof of work (p-o-w) systems are a variation on e-postage that uses computation rather than money. A mail sender solves a lengthy computational problem and presents the result with the message. The problem takes long enough that the sender can only do a modest number per time period, and so cannot send a lot of messages, thereby preventing spamming. But on a net full of zombies, proof of work doesn't work. more

Broadband Routers and Botnets: Being Proactive

In this post I'd like to discuss the threat widely circulated insecure broadband routers pose today. We have touched on it before. Today, yet another public report of a vulnerable DSL modem type was posted to bugtraq, this time about a potential WIRELESS flaw with broadband routers being insecure at Deutsche Telekom. I haven't verified this one myself but it refers to "Deutsche Telekom Speedport w700v broadband router"... more

Permanent Denial-of-Service Attacks on the Rise, Incidents Involve Hardware-Damaging Assaults

Also known loosely as "phlashing" in some circles, Permanent Denial-of-Service (PDoS) is an increasing popular form of cyberattack that damages a system so badly that it requires replacement or reinstallation of hardware. more