/ Most Viewed

UK Government Releases New Cyber Security Standard for Self-Driving Vehicles

UK government today announced the release of a new cyber security standard for self-driving vehicles. Funded by the Department for Transport, the British Standards Institute has developed the guidance to set a marker for those developing self-driving car technologies. more

When No Action Is the Wisest Action (ICANN Does Good)

Although ICANN is now getting a lot of ridicule for the "glitch" in its TLD application System, it deserves some praise and respect for the results of its April 10 board meeting. In that meeting, the board showed the involved community - and the rest of the world - that it is no longer going to be stampeded by extra-procedural political pressure to make yet another round of hasty amendments to its new TLD program's policies and procedures. more

Return of Net Neutrality: Discussion of European Net Neutrality Proposal Relevant for U.S. Broadband Market

There is an interesting recent discussion in Europe about net neutrality that has relevance to the U.S. broadband market. The European Commission that oversees telecom and broadband has started taking comments on a proposal to force content generators like Netflix to pay fees to ISPs for using the Internet. I've seen this same idea circulating here from time to time, and in fact, this was one of the issues that convinced the FCC first to implement net neutrality. more

LAC, the DNS, and the Importance of Comunidad

The 1st Latin American & Caribbean DNS Forum was held on 15 November 2013, before the start of the ICANN Buenos Aires meeting. Coordinated by many of the region's leading technological development and capacity building organizations, the day long event explored the opportunities and challenges for Latin America brought on by changes in the Internet landscape, including the introduction of new gTLDs such as .LAT, .NGO and others. more

Two Romanians Charged for Hacking Washington DC Police Computers Linked to Surveillance Cameras

US prosecutors have charged two Romanians with hacking Washington DC police computers linked to surveillance cameras just days before President Donald Trump's inauguration. more

The Internet Is Designed for Surveillance

The current implementation of the Internet is hierarchical in that we get IP addresses from providers and then use a DNS that is rooted. We go even further in requiring that we conform to conditions on our intent (AKA our use) of connectivity in order to get a temporary lease on something so fundamental as our identity in the guise of a DNS name. We go further by accepting the idea that we communicate within pipes owned by service providers who can dictate terms in order to extract a rent. more

Critical Data Belongs in the Cloud, Not Under It - Lessons Learned from Irene

"As flood waters from Tropical Storm Irene swamped the Waterbury state office complex, seven employees from the Vermont Agency of Human Services rushed inside to rescue computer servers that are critical for processing welfare checks and keeping track of paroled prisoners living around the state," according to a story by Shay Totten on the 7days blog Blurt. Two of the employees - network administrator Andrew Matt and deputy chief information officer Darin Prail - lost their cars in the parking lot as the river rose but kept on working to assure that our servers were not lost. "We didn't know how much time we had," Matt said, "and our job was to save the servers." more

Could You Go for a Year Without Internet Access? Paul Miller Reports on His Experiment…

Could you sign off of the Internet today -- right now, in fact -- and not come back online for 12 months? If you are a reader of CircleID, odds are pretty good that the answer is probably an emphatic "No!" This is, after all, a site for "Internet Infrastructure" and for most of us visiting the site (or writing here) the "Internet" is completely woven into the fabric of our lives... and we have a hard time thinking of a life without it. more

Death of the PKI Dragons?

The recent attack on the Comodo Certification Authority has not only shown how vulnerable the current public key infrastructure is, but also that the protocols (e.g., OSCP) used to mitigate these vulnerabilities once exploited, are not in use, not implemented correctly or not even implemented at all. Is this the beginning of the death of the PKI dragons and what alternatives do we have? more

What Your ISP (Probably) Knows About You

Earlier this week, I came across a working paper from Professor Peter Swire - a highly respected attorney, professor, and policy expert. Swire's paper, entitled "Online Privacy and ISPs", argues that ISPs have limited capability to monitor users' online activity. The paper argues that ISPs have limited visibility into users' online activity for three reasons: (1) users are increasingly using many devices and connections, so any single ISP is the conduit of only a fraction of a typical user's activity; (2) end-to-end encryption is becoming more pervasive, which limits ISPs' ability to glean information about user activity; and (3) users are increasingly shifting to VPNs to send traffic. more

ICANN To Publish New gTLD Applicants On April 30th

In a recent press release ICANN has stated that they will publish the list of applicants for new generic Top-Level Domains (gTLDs) on April 30th. Previously many had spoken of a "big reveal" on May 1st, though that would have coincided with a public holiday in many countries and might have been "missed". However ICANN CEO, Rod Beckstrom, claims that the organisation had always planned to publish the list two weeks after the application window closed. more

How Many of the New gTLDs Will Fail?

I was just asked the question: How many of the new Top-Level Domains (TLDs) will fail? This poor listener might have hoped for one sentence as response, but that subject is too interesting to be brief. In this scenario you can't look to historical data to measure or predict the success rate of the new TLDs because past new TLDs have been largely managed by big businesses who have strong revenue streams from other business lines that they could use to support a slacking TLD. more

SIP Revolution, Massively Delayed - But There’s Hope

The SIP Center asked for an article which I finally wrote the weekend before last. My article was actually rather negative, but they published it anyway. Now I'm feeling a little guilty as there is an optimistic note I could have used as my conclusion. So let me try again... First let me summarize my problem. When SIP emerged in 1996, it's support for direct connections from one user to another was extremely compelling. This was the VoIP protocol which would lead to a complete revolution in communications... more

UN and the Global Digital Compact: How to Strengthen the IGF?

According to UN Secretary-General Antonio Guterres, the forthcoming UN World Summit on the Future", scheduled for September 2024, should adopt a "Global Digital Compact" (GDC).1 The GDC is part of the so-called "UN Common Agenda." The compact is expected to "outline shared principles for an open, free and secure digital future for all" and to cover issues as digital connectivity, avoiding Internet fragmentation, providing people with options as to how their data is used... more

Cyber Security Word Salad

Two months ago, the Trump White House published its National Cyber Strategy. It was followed a few days ago with the release of its draft NSTAC Cybersecurity "moonshot." The Strategy document was basically a highly nationalistic America-First exhortation that ironically bore a resemblance to China's more global two-year-old National Cybersecurity Strategy. more