I can hardly believe it's that time of year again -- time for our annual top 10 year in review. Having been at this for more than 20 years, you'd think I'd seen it all? But with the domain name industry, things are always in flux, and I could never have predicted some of these items. So without further ado -- here are the top 10 biggest stories from 2022. more
The Internet is in for interesting times. Previously, on Renysys' blog I wrote about the engineering issues and the policy issues facing us over the next five years. But there is at least one large issue still lurking. Most of you will not be surprised to learn that almost all of these issues are outgrowths of a single factor: money. The core of the Internet still doesn't have a sustainable business model. more
The Microsoft action against 3322.org, a Chinese company, started with the news that computers were infected during the production phase. Stepping away from the controversy surrounding the approach, there are important lessons that cyber security officials and upper management, deciding on the level of and budget for cyber security in organisations should learn and take into account. I'm writing this contribution from a premise: China uses the fact that most IT devices are built in China to its advantage. Allow me to start with an account from personal memory to set the stage. more
The widely publicized auction of the domain name KerryEdwards.com ended Saturday night, but the search for a new owner continues. According to Matt Bentley, CEO of Sedo.com, the domain name brokerage managing the sale, a key bidder withdrew at a late stage in the auction, leaving the domain up for grabs among the dozen or so parties who had expressed a serious interest in purchasing the domain. more
Over two years of war, Israel has decimated Gaza's ICT infrastructure, crippling connectivity, impeding emergency response, and isolating civilians from the digital world, while cementing long-standing control over telecommunications under the guise of national security. more
I recently saw that AT&T is offering a $10,000 reward to anybody who provides information that leads to the arrest and conviction of people stealing copper wiring. The particular announcement is related to a recent theft of copper in South Dallas, Texas, but there have been numerous other thefts. This is not a small problem, and the estimated value of stolen telephone copper is between $1.5 and $2 billion annually. more
Undersea cables between the U. S. and Cuba have long been intertwined with politics. In 1887, The New York Times reported on the inauguration of a cable in support of the Cuban insurgents fighting for independence from Spain -- a precursor to the Spanish-American war. Phone service between the U.S. and Cuba began in 1921 with AT&T's installation of an undersea cable and AT&T dominated international telephony to Cuba until the 1990s. more
Over the past decade Simplified Chinese has grown to become one of the most popular languages on global websites, second only to English. According to the Web Globalization Report Card, which has long monitored languages supported by the world's leading brands, Chinese was seen on only about six out of ten websites in 2006. Today, it is seen on virtually every global website. more
Audacity by federal policy makers can be admirable, at least in some cases, but it can a bit more problematic in others. A case in point is the Food and Drug Administration's "deeming" of the internet to be a tobacco product. The FDA explained that it was exercising its authority under the Family Smoking Prevention and Tobacco Control Act which gave the agency an extensive set of duties, responsibilities and authorities over "tobacco products." more
n 2004 Jaynes became the country's first convicted spam felon under the Virginia anti-spam law. He's been appealing his conviction ever since, most recently losing an appeal to the Virginia Supreme Court by a 4-3 decision in February. As I discussed in more detail at the time the key questions were a) whether the Virginia law had First Amendment problems and b) whether Jaynes had standing to challenge it. The court answered No to b), thereby avoiding the need to answer a), the dissent answered Yes to both. more
As we embark on a new year and decade, it seemed worthwhile to take a peek at the principal forums for global 5G industry technical collaboration and do a quick assessment of what is occurring and who are the "leaders." The leadership dimension is especially relevant in Washington these days – which is suffering from a peculiar 5G dementia. As the year ended, there were no less than 35 current 5G related Congressional legislative actions, several of which actually passed one of the chambers. more
When I read government arguments in defense of the NSA, an oft-repeated line was: We're not targeting Americans. We're targeting foreigners. Foreigners. I really dislike that word. And I'm sure companies like Apple, Google and Facebook do as well. Why? more
There have been a number of occasions when the Internet Engineering Task Force (IETF) has made a principled decision upholding users' expectations of privacy in their use of IETF-standardised technologies. (Either that, or they were applying their own somewhat liberal collective bias to the technologies they were working on!) The first major such incident that I can recall is the IETF's response to the US CALEA measures. more
Yes, that is a title of a real, current legal case and controversy. And, no, the links in this post are not spam... mostly gambling news sites seem to be reporting on this. The Governor of Kentucky, through his Justice and Public Safety Cabinet, has moved in court to have 141 gambling-related domain names transferred to the Kentucky state government, partially because other legal gambling operations in Kentucky, like horseracing, lose revenue to online gaming. Yes, you read that right: by allegedly violating KY law, the state can move to have property used in these unlawful acts transferred to the state. In this case, the "property" in question is the domain names themselves. This case is definitely novel in the realm of cyberlaw, but also is a bit controversial for how it originally proceeded... more
I have written about the problems with the "little green lock" shown by browsers to indicate a web page (or site) is secure. In that article, I consider the problem of freely available certificates, and a hole in the way browsers load pages. In March of 2017, another paper was published documenting another problem with the "green lock" paradigm - the impact of HTTPS interception. more