/ Most Viewed

US Senators Move to Shield Undersea Internet Cables from Global Threats

A bipartisan Senate bill seeks to strengthen U.S. oversight and global coordination to protect undersea fiber-optic cables, vital infrastructure increasingly targeted by geopolitical adversaries, natural disasters, and cyber or physical sabotage. more

Nominations Open for 2024 Public Interest Registry (PIR) Board of Directors

Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? (and more) Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for two positions on the PIR Board of Directors. The nomination deadline is 31 January 2024. more

The Sportsmanship of Cyber-warfare

As a bit of a history buff I can't avoid a slight tingling of déjà vu every time I read some new story commenting upon the ethics, morality and legality of cyber-warfare/cyber-espionage/cyberwar/cyber-attack/cyber-whatever. All this rhetoric about Stuxnet, Flame, and other nation-state cyber-attack tools, combined with the parade of newly acknowledged cyber-warfare capabilities and units within the armed services of countries around the globe, brings to the fore so many parallels... Call me a cynic if you will, but when the parallels in history are so evident, we'd be crazy to ignore them. more

Inquiring About the “Unthinkable”

There has been no shortage of speculation within the ICANN community regarding the continued show down between the ICANN Board and its Governmental Advisory Committee (GAC) over new generic Top-Level Domains (gTLDs) and the pending expiration of the IANA contract this September. Now one of the more interesting topics of discussion that I have had with multiple independent parties was the potential of ICANN making changes to the L root zone file... more

IP Addresses and Privacy Sensitive Data - A Level Playing Field Needed

Reading Peter Olthoorn's book on Google (a link is found here), I ran into a passage on IP addresses. Where Google states that it does not see an IP address as privacy sensitive. An IP address could be used by more than one person, it claims. The Article 29 Working Party, the EU privacy commissioners, states that it is privacy sensitive as a unique identifier of a private person. It got me wondering whether it is this simple. Here is a blog post meant to give some food for thought and debate. I invite you to think about the question 'how private is an IP address'? more

A Look at Mail Patterns from Legitimate Webmail Sources

For many years, I have tracked spam from botnets and reported on it. I have analyzed those botnets' distribution patterns by number of IPs, number of messages per email envelope and geographical distribution. While spam from botnets is interesting, and the main source of spam, it is not the only source of spam. What about spam that originates from the MAGY sources? more

MySpace Wins Big Against Richter?

News rumblings are that MySpace is celebrating its $6mm award against Scott Richter and his entities... Who Won? ...I'm not sure what MySpace asked for (their complaint is probably not a reliable barometer) but the overall tone of the document written by the arbitrator is that Richter's companies shouldn't be held entirely liable for all damages to MySpace. (In fact, the arbitrator's decision takes pains to show both sides of Richter. Some would say this is typical in arbitration.) more

Wireless VoIP: Loss Leader or Upselling Strategy?

Verizon Wireless' decision to allow their subscribers to access Skype raises a question about strategy. Is Verizon leveraging Skype access as an inducement for subscribers to upgrade to smartphones and commit to $30 a month data plans, has the company acknowledged that its future marketplace success lies in data and not voice services, and how will the company prevent a substantial reduction in plain old voice subscriptions priced above the $30 data plan benchmark? more

Spamhaus Tells Us That Botnets Are Getting Worse

The Spamhaus Project just published a long article about the botnets they've been watching during 2014. As this chart shows, we're not making any progress. They also note that the goals of botnets have changed. While in the past they were mostly used to send spam, now they're stealing banking and financial information, engaging in click fraud, and used for DDoS and other malicious mischief. more

A Dangerous Buzz, and Opt-In Isn’t Just for Email

Google is great at generating buzz, and they've done it again with their new social vitality tool, appropriately named Google Buzz. Buzz takes all of your Gmail contacts (and presumably other connections from elsewhere within the Googleplex), and makes them all your "friends" by default; it then shares your activity from Google Reader, YouTube, and other tools with all of them, and vice versa... more

Green Dam is Breached… Now What?

As a number of China hands predicted, the Chinese government has postponed its mandate requiring that all computers sold in China must include the Green Dam -Youth Escort censorware by today. Yesterday after the news broke I told the Financial Times: "There's been this impression in the internet industry that when the Chinese government makes a demand, they have to roll over and play dead. The lesson here is that's not necessarily the case." more

ICANN Issues a Statement on the Spamhaus Case

ICANN issued a statement on the Spamhaus case: "...ICANN is not a party to this action and no order has been issued in this matter requiring any action by ICANN. Additionally, ICANN cannot comply with any order requiring it to suspend Spamhaus.org..." more

Responding to “The Case for Regulatory Capture of ICANN”

This past Monday, as ICANN65 was beginning in Marrakesh, the technical review blog Review Signal published a detailed expose, "The Case for Regulatory Capture of ICANN" authored by site founder and "geek-in-charge" Kevin Ohashi. The post was clearly the product of extensive investigative reporting – and what it reveals is deeply disturbing. more

Censorship, Email and Politics

Spamfiltering blocks email. This is something we all know and understand. For most people, that is everyone who doesn't manage an email server or work in the delivery field or create spamfilters, filtering is a totally unseen process. The only time the average person notices filters is when they break. The breakage could be blocking mail they shouldn't, or not blocking mail they should. more

Making Network Neutrality Sustainable, Revisited

Today FCC Chairman Genichowski announced that the FCC's Network Neutrality Proceeding is entering the rule-making stage. This is a historic milestone, worth celebrating, but the milestone is on a road with hairpin turns. If you look directly above us, you can see we're in almost exactly the same place we used to be when the pro-competition provisions of the 1996 Telecom Act were intact and the distinction between telecommunications service and information service was meaningful, but now we are a lot lower. more