"If at first you don't succeed, try and try again." A famous saying, that some within the ICANN world seem to think actually means: "if at first you don't get what you want, try and try again." The basic premise of the ICANN system is simple and fair: get all parties to work together, give everyone an equal voice, and act on whatever consensus emerges. ICANN insiders have coined this the "multi-stakeholder, bottom-up, policy development process". more
Microsoft is a special company. By definition, its operating systems and Internet browser are no longer just "applications;" they constitute a platform. They are - for 90 percent of Internet users - the sole interface to all Internet content and services. The browser is its own little monopoly. Such is its dominance that Microsoft has the power of life and death over innovation. more
It’s been a while since I took a look at the worldwide Internet. The statistics cited below come from Datareportal. The world population in January 2024 was 8.08 billion, up 74 million from a year earlier, a growth rate of 0.9%. There were 5.61 billion unique mobile subscribers in January, up 138 million (2.5%) over a year earlier. 5.35 billion people used the Internet at the end of 2023, up 97 million (1.8%) from a year earlier. more
Speaking at a private event hosted by Village Global VC, tech luminary and former Google CEO Eric Schmidt predicted that the internet will split into Chinese-led and US-led versions by 2028. more
Larry Strickling, who runs the NTIA (the part of the U.S. Department of Commerce that handles ICANN), yesterday gave an important and remarkable speech to the Practicing Law Institute about Internet governance. His speech, timed to coincide with an orchestrated ICANN-bashing across town in the Senate, was a striking defense of the ICANN model and a repudiation of special pleading outside the process. more
Ensuring federal cybersecurity is essential to protecting national security. According to some media reports, recommendations have been made to the Bush Administration to "create a distinct administrative cybersecurity position within the Homeland Security Department to oversee progress in the federal government and act as a liaison with private industry." However, before new bureaucracy is created, it is important to recognize the practical cybersecurity policies and projects that are already being undertaken by the Administration. more
The frequency of DDoS attacks has risen by 40% year on year while the duration of attacks decreased with 77% lasting ten minutes or less, according to a new report released by Corero Network Security. more
In September 2015, John Levine asked why ICANN should be considered a tax-exempt organization following the completion of the U.S. government's transition of technical management of the Internet's Domain Name System (DNS). The U.S. Internal Revenue Service (IRS) determined that ICANN was an exempt organization in 2000 and, inarguably, circumstances have evolved materially since then. more
Domain name registries and registrars will not be able to implement ICANN's proposed overhaul of the Whois system in time for the EU's General Data Protection Regulation according to an estimated timetable from ICANN. more
At ICANN's meeting in Egypt last week, I had the opportunity to try and explain to various non-technical audiences why the Domain Name System (DNS) is vulnerable to attack, and why that is important, without needing a computer science degree to understand it. Here is the summary. more
Tonight begins the third annual SIP Network Operators Conference (SIPNOC) in Herndon, Virginia, where technical and operations staff from service providers around the world with gather to share information and learn about the latest trends in IP communications services - and specifically those based on the Session Initiation Protocol (SIP). Produced by the nonprofit SIP Forum, SIPNOC is an educational event sharing best practices, deployment information and technology updates. Attendees range from many traditional telecom carriers to newer VoIP-focused service providers and application developers. more
As we increasingly move towards an IoT world, vendors of safety-critical devices will be patching their systems just as regularly as phone and computer vendors do now. Researchers warn that many regulators who previously thought only in terms of safety will have to start thinking of security as well. more
Possibly the first documented native IPv6 DDoS attack reported today suggests a DNS dictionary attack which originated from around 1,900 different native IPv6 hosts, on more than 650 different networks. more
One of the "key" questions cryptographers have been asking for the past decade or more is what to do about the potential future development of a large-scale quantum computer. If theory holds, a quantum computer could break established public-key algorithms including RSA and elliptic curve cryptography (ECC), building on Peter Shor's groundbreaking result from 1994. more
As is well known to most CircleID readers - but importantly, not to most other Internet users - in March 2011, ICANN knowingly and purposefully embraced an unprecedented policy that will encourage filtering, blocking, and/or redirecting entire virtual neighborhoods, i.e., "top-level domains" (TLDs). Specifically, ICANN approved the creation of the ".XXX" suffix, intended for pornography websites. Although the owner of the new .XXX TLD deems a designated virtual enclave for morally controversial material to be socially beneficial for the Internet, this claim obfuscates the dangers such a policy creates under the hood. more