/ Most Viewed

Greylisting Still Works - Part II

In my last post I blogged about greylisting, a well-known anti-spam technique for rejecting spam sent by botnets. When a mail server receives a an attempt to deliver mail from an IP address that's never sent mail before, it rejects the message with a "soft fail" error which tells the sender to try again later. Real mail senders always retry, badly written spamware often doesn't. I found that even though everyone knows about greylisting, about 2/3 of IPs don't successfully retry. more

It’s Safe to Be a Dog on the Internet Again: Lori Drew Prosecution Terminated

"On the Internet, no one knows whether you're a dog." Of course, if you are a dog, and you are fibbing about it, according to the US Attorneys Office out in California you're a felon and should be sent to the dog pound. Fortunately, there's a new dog in town who seems to be howling a different tune. Bad facts make for bad law. The unfortunate alleged facts of this case involved fibbing about actual identities, playing with a young girl's emotions, and the girl's eventual suicide. more

A Look at the Current State of ccTLDs, Particularly in Europe

European ccTLDs have passed 67 million registrations in total at a net growth of 0.7% over the past quarter, according to the new DomainWire report by Council of European National Top level Domain Registries (CENTR). more

FCC to Hold Two December Workshops on PSTN Transition to New Technologies

The US Federal Communications Commission (FCC) recently issued a public notice that it will be holding two workshops on the transition of the public switched telephone network (PSTN) to "new technologies" such as voice-over-IP (VoIP). The workshops will be held on December 6 and 14, 2011, at the FCC's office in Washington, DC. The public notice states the goal as... more

Keynote Speaker for Name Collisions Workshop: Bruce Schneier

There may still be a few security practitioners working in the field who didn't have a copy of Bruce Schneier's Applied Cryptography on their bookshelf the day they started their careers. Bruce's practical guide to cryptographic algorithms, key management techniques and security protocols, first published in 1993, was a landmark volume for the newly emerging field, and has been a reference to developers ever since. more

Can Large Language Models Use the Contents of Your Website?

Large Language Models (LLM) like GPT -- 4 and its front-end ChatGPT work by ingesting gigantic amounts of text from the Internet to train the model and then responding to prompts with text generated from those models. Depending on who you ask, this is either one step (or maybe no steps) from Artificial General Intelligence, or as Ted Chiang wrote in the New Yorker, ChatGPT Is a Blurry JPEG of the Web. more

September Deadline: Can The ICANN Model Be Revised?

On September 30, 2002, the Memorandum of Understanding (MOU) between the US Department of Commerce (DOC) and the corporation created to privatize the infrastructure of the Internet will expire. This corporation, known as ICANN (Internet Corporation for Assigned Names and Numbers) has had a very contentious existence from its earliest days. On July 10, 2002, a US Department of Commerce official, Nancy Victory, sent a letter to ICANN. She wrote that the agreement between ICANN and the DOC "will expire on September 30, 2002 and in the coming weeks, the Department of Commerce will assess whether to renew, extend, or modify this agreement. To assist in this review process," Victory asked, "I request that you provide me with a report detailing ICANN's efforts in these areas, as well as any other information that might inform the Department in its decision-making with respect to this agreement." Victory said that the response to her letter should be sent no later than August 15, 2002. more

Moving from 4G to 5G

A great deal of hype is out there, as vendors talk up the next development in mobile technology, known as 5G. FCC Chairman Tom Wheeler made a good comparison. He said that one person looking at the paintings by the Master in the Picasso Museum in Barcelona sees a different picture to the person next to them. That's what 5G is all about at the moment -- a great picture with lots of different interpretations. more

Solving the Spam Problem

Last week, I read Ed Falk's blog post where he commented on a possible solution to the spam problem. He himself was commenting on a study done by researchers out of the University of California where they discovered that credit card transactions for stuff bought in spamvertisements are handled by three companies: one in Azerbaijan, one in Denmark and one in the West Indies. Presumably, if security experts and law enforcement went after these companies, spammers would have their financial supply cut off. No money = no incentive to spam. more

When Did CIRA Become the Commercial Internet Registration Authority?

Nearly ten years ago, the Government of Canada wrote a letter to the chair of the Canadian Internet Registration Authority (CIRA) that set out the framework for the management of the dot-ca domain. The government articulated a vision of the dot-ca domain as a “key public resource” and called on CIRA to act in an open and transparent manner. CIRA has long sought to live up to those standards, but in recent months the organization has shown an unmistakable shift toward prioritizing commercial gain over the public interest along with a troubling move toward secret decision making... more

Microsoft Announces $5 Billion Investment in IoT Over the Next Four Years

Microsoft will invest $5 billion in the Internet of Things over the next four years, said Julia White, Corporate Vice President, via a blog post today. more

Russian Interference More Vigorous than Assumed, Over 39 States Targeted During Election

"Voter databases and software systems in an overwhelming number of states -- 39 to be exact -- were targeted by Russian cyberattacks over the summer and fall of 2016," Allegra Kirkland reporting today in TPM more

The Blackout: Preventing Network Domino Effects

After a widespread blackout hit the United States and Canada, the so-called network domino effect attracted high public attention. Modern physicists have paid attention to the effect of network dominos. Especially, scientists who have studied complex systems have warned that a network domino effect, if it occurs, will bring chaos to a society that is well connected through the Internet. The cause of the blackout in the United States and Canada was not traced down quickly. But it apparently shows a typical network domino effect.  more

Vladimir Putin Signs ‘Sovereign Internet’ Law to Further Tighten Government Control of the Internet

President Vladimir Putin on Wednesday signed an "internet sovereignty" bill into law that further expands government's control of the Internet. more

Another Registrant Loses UDRP Where Trademark ‘Spans the Dot’

Here's another example of a domain name dispute where the top-level domain (TLD) was essential to the outcome of the case -- because it formed a part of the complainant's trademark: mr.green. In this decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), the panel joined a short but (slowly) growing list of disputes in which the TLD plays a vital role. more