/ Most Viewed

Senate Oversight Hearing Explores “Test Drive” of IANA Transition

The IANA transition still appears to be on track for consummation at the end of the September 30th expiration date of the current contract between NTIA and ICANN in the wake of the May 24th Senate Commerce Committee oversight hearing on "Examining the Multistakeholder Plan for Transitioning the Internet Assigned Number Authority". That is, while there are clearly some concerns on both sides of the aisle about terminating the remaining U.S. government ties to ICANN... more

Crawford Likes Aussie Utility Network

Susan Crawford, special assistant to the president for science, technology and innovation policy and a member of the National Economic Council, is reported to be favorably inclined towards a U.S. network much like Australia's recently announced $33B broadband plan. Of course, the U.S. is some 15 times bigger than Australia, and that'd make the price tag closer to $500B by straight multiplication. But the U.S. would get a fiber network done right... more

Mauritius Steps In: Unraveling the AFRINIC Crisis and Its Impact on African Internet Governance

A Supreme Court judge in Mauritius has been appointed to investigate AFRINIC, Africa's IP address registry, following allegations of misconduct, legal irregularities, and criminal falsification. The inquiry marks a pivotal moment in African internet governance, with implications for regional digital infrastructure and the continent's credibility in managing critical online resources. more

Keynote Speaker for Name Collisions Workshop: Bruce Schneier

There may still be a few security practitioners working in the field who didn't have a copy of Bruce Schneier's Applied Cryptography on their bookshelf the day they started their careers. Bruce's practical guide to cryptographic algorithms, key management techniques and security protocols, first published in 1993, was a landmark volume for the newly emerging field, and has been a reference to developers ever since. more

Thoughts on the Open Internet - Part 4: Locality and Interdependence

The Internet was not originally designed as a single network that serviced much of the world's digital communications requirements. Its design was sufficiently flexible that it could be used in many contexts, including that of small network domains that were not connected to any other domain, through to large diverse systems with many tens of thousands of individual network elements. If that is indeed the case, then why is it that when networks wish to isolate themselves from the Internet, or when a natural calamity effectively isolates a network, the result is that the isolated network is often non-functional. more

EU’s Cyber Security Agency Identifying Five Areas as Critical IT Security

The EU's 'cyber security' Agency ENISA (The European Network and Information Security Agency) has launched a new report concluding that the EU should focus its future IT security research on five areas: cloud computing, real-time detection and diagnosis systems, future wireless networks, sensor networks, and supply chain integrity. more

Another Registrant Loses UDRP Where Trademark ‘Spans the Dot’

Here's another example of a domain name dispute where the top-level domain (TLD) was essential to the outcome of the case -- because it formed a part of the complainant's trademark: mr.green. In this decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), the panel joined a short but (slowly) growing list of disputes in which the TLD plays a vital role. more

Why Do We Accept $10 Security on $1,000,000 Data?

Last week we heard of yet another egregious security breach at an online provider, as crooks made off with the names, address, and birth dates of eBay users, along with encrypted passwords. They suggest you change your password, which is likely a good idea, and you better also change every other place you used the same password. But that's not much help since you can't change your name, address, and birth date, which are ever so handy for phishing and identity theft. more

Wrap-up: ICANN 46 in Beijing

Earlier this April, the largest ICANN meeting ever -- more than 2,500 attendees -- kicked off in Beijing. Given the imminent addition of hundreds of "dot Brands" to the Internet, the topic of new gTLDs was at the top of the discussion list for all attendees. So far, well over 100 new gTLD applications have passed the Initial Evaluation stage, meaning they're on their way to becoming live domains. more

Lawyer-Impersonator Pleads Guilty over False C&Ds

As if there weren't enough problems with lawyers sending out improper cease-and-desists, Wired News reports that a Nevada man has pleaded guilty to impersonating a lawyer to extort domain registrants to turn over their domain names. "A Nevada man pleaded guilty Thursday to his plotting to steal domain names from their legitimate owners by impersonating a California intellectual property lawyer and send threatening letters to domain name owners in hopes of convincing them to turn over the domains to him..." more

Managing (in)Security Through Regulation: A Key Phase for Nation States

Not so long ago, the notion of introducing laws and other regulatory responses to address cyber security issues was regarded with significant hesitation by governments and policy makers. To some extent, this hesitation may well have stemmed from a general perception by those who do not work directly in the field that the world of cyber security is somewhat of a 'dark art'. More recently, however, there has been a substantial shift in this attitude, with proposals to regulate a range of cyber security related matters becoming increasingly numerous. more

Starlink Beta vs. Fiber

Last year we had terrible DSL from Consolidated Communications and much better, although not always consistent, service from wireless ISP GlobalNet. I signed up for fiber service from Stowe Cable for installation this year and also was accepted early as a Beta tester for Starlink. Now we have both Starlink and fiber and can compare the two. I was very happy to cancel my Consolidated service but felt bad about canceling GlobalNet, which was essential to me for many years. Most of the time, there are only two of us in the house. more

DNS Amplification Attacks: Out of Sight, Out of Mind? (Part 2)

This post follows an earlier post about DNS amplification attacks being observed around the world. DNS Amplification Attacks are occurring regularly and even though they aren't generating headlines targets have to deal with floods of traffic and ISP infrastructure is needlessly stressed -- load balancers fail, network links get saturated, and servers get overloaded. And far more intense attacks can be launched at any time. more

FCC to Hold Two December Workshops on PSTN Transition to New Technologies

The US Federal Communications Commission (FCC) recently issued a public notice that it will be holding two workshops on the transition of the public switched telephone network (PSTN) to "new technologies" such as voice-over-IP (VoIP). The workshops will be held on December 6 and 14, 2011, at the FCC's office in Washington, DC. The public notice states the goal as... more

When Did CIRA Become the Commercial Internet Registration Authority?

Nearly ten years ago, the Government of Canada wrote a letter to the chair of the Canadian Internet Registration Authority (CIRA) that set out the framework for the management of the dot-ca domain. The government articulated a vision of the dot-ca domain as a “key public resource” and called on CIRA to act in an open and transparent manner. CIRA has long sought to live up to those standards, but in recent months the organization has shown an unmistakable shift toward prioritizing commercial gain over the public interest along with a troubling move toward secret decision making... more