/ Most Viewed

Who is Keeping TAS Down?

Today, Friday April 27, ICANN had promised an update on the problems that led to its TLD Registration System (TAS) being taken offline on April 12. As the working day ends in Europe, that update has yet to come. Even if it does, I would not expect anything more concrete than the "we are still working on the issue, thanks for your patience" message of recent days. So what's really going on here? Does anyone at ICANN seriously expect us to believe that the tech team is "still reviewing the TAS data and checking the integrity of each and every application"? more

ARIN Takes Steps Toward Greater Diversity

For some time, the board of the American Registry for Internet Numbers (ARIN) has expressed a desire to have greater diversity across its leadership structures. Finally, steps are being taken to have representation that better reflects the diversity of the ARIN community... since ARIN was founded on April 18, 1997, two of its main oversight structures -- the Board of Trustees and Advisory Council -- have only been populated with persons from North America. At last, that changes. more

A Digital Protocol From Kyoto and a Cyber Message From Hamburg: IGF and ICANN Are Well Prepared for the Future

On October 12, 2023, the 18th Internet Governance Forum (IGF) ended in Kyoto. It was, with more than 9000 registered participants, the largest IGF since its inception in 2006. UN Secretary-General Antonio Guterres and Japan Prime Minister Fumio Kishida opened the five-day meeting. The tangible output included 89 "IGF Messages from Kyoto," four substantial reports with recommendations from IGF Policy Networks (PN) for Artificial Intelligence... more

Preventing ‘Techlash’ in 2018: Regulatory Threats

U.S. Chamber of Commerce President Thomas J. Donohue on January 10, 2018, warned that "techlash" is a threat to prosperity in 2018. What was he getting at? A "backlash against major tech companies is gaining strength -- both at home and abroad, and among consumers and governments alike." "Techlash" is a shorthand reference to a variety of impulses by government and others to shape markets, services, and products; protect local interests; and step in early to prevent potential harm to competition or consumers. more

Net Neutrality and the Obama Stimulus Package

As long as US telecom is duopoly dominated, a neutral Internet is endangered if not impossible; regulation of this kind of concentrated power is necessary but is unlikely to be sufficient. The solution, IMHO, is to dilute the power of the duopoly so that consumers can buy whatever kind of Internet access they want. Countries like the UK with a competitive ISP market do not seem to have net neutrality problems nor require net neutrality regulation and have better Internet access than we do at lower prices. more

The IETF’s *Other* Diversity Challenge

The Internet Engineering Task Force (IETF) is the standards body for the Internet. It is the organization that publishes and maintains the standards describing the Internet Protocol (IP -- versions 4 and 6), and all directly related and supporting protocols, such as TCP, UDP, DNS (and DNSSEC), BGP, DHCP, NDP, the list goes on, and on... But how do they do that? How does the IETF produce documents, and ensure that they are high quality, relevant, and influential? more

Data Growth, IoT Will Lead to Unlimited Energy Consumption If Not Controlled, Scientists Warn

Researchers from Lancaster University's School of Computing and Communications have warned that the rapid growth of remote digital sensors and devices connected to the internet -- Internet of Things -- has the potential to bring unprecedented and, in principle, almost unlimited rises in energy consumed by smart technologies. more

Accreditation & Access Model For Non-Public Whois Data

In the current debate over the balance between privacy and Internet safety and security, one of the unanswered questions is: "How will those responsible for protecting the public interest gain access to the non-public data in the WHOIS databases post General Data Protection Regulation (GDPR)?" In an attempt to prevent WHOIS data from going "dark," several community members have been working for the past weeks to create a model that could be used to accredit users and enable access to the non-public WHOIS data. more

Anti-Phishing Working Group Proposes Use of Secure Hashing to Address GDPR-Whois Debacle

The AntiPhishing Working Group (APWG) in a letter to ICANN has expressed concern that the redaction of the WHOIS data as defined by GDPR for all domains is "over-prescriptive". more

Equifax Breach Blamed on Open-Source Software Flaw

Equifax has blamed a flaw in the software running its online databases for the massive breach revealed last week that has allowed hackers to steal personal information of as many as 143 million customers. more

The End of HFC and FttN Networks is Approaching

In the global telecoms industry, it looks as though 2013 will be remembered as the year when construction of new greenfield HFC networks came to a halt. Of course, there will still be upgrades to existing networks but the cost of fibre deployment -- linked to its much lower operational cost -- is now convincing cablecos and telcos alike to build new fibre networks wherever possible. This is not necessarily directly driven by customer demand, but by network costs and network efficiencies. more

The Top 3 Emerging Threats on the Internet

Last week at RSA, Bruce Schneier gave a talk on the top 3 emerging threats on the Internet. Whereas we in the security field usually talk about spam, malware and cyber crime, he talked about three meta-trends that all have the potential to be more dangerous than the cybercriminals. Here are my notes. more

Does ICANN Need to Evolve Its Code of Conduct?

If you follow the Internet governance world like I do, you've no doubt had time to ponder the news of former ICANN Board Chair Peter Dengate Thrush's appointment as Executive Chairman of Top Level Domain Holdings Limited (TLDH). This was a seemingly fast jump from the body that coordinates the Internet (whose most recent milestone was to approve the creation of new gTLDs) to one of the key companies that stands to actively benefit from this burgeoning part of the domain name industry. Further, he's taken up a position that, according to reports, will allow him to benefit substantially as well. more

Smart Phishing for Smartphones

A common security prediction for 2010 is the continued rise of malware and phishing attacks on mobile phones. The MarkMonitor Security Operations Center recently detected an interesting twist on this theme involving a popular smartphone and the latest smart technologies used by cybercriminals. In this case, instead of compromising a smartphone to steal its information, cybercriminals used phishing techniques to clone smartphones. more

Big Data Stress? Go Zen With These 5 Technologies

The promise of "big data" -- real-time insights, predictive analytics and a better understanding of customer behaviors -- has many companies jumping into this near-bottomless information pool with both feet. But the sheer volume of data can cause serious stress for IT professionals trying to balance C-suite expectations, legacy tech limitations and corporate workloads. What's more, the data market is rapidly evolving. more