Back when I started working in this industry in 2001, ICANN was small, the industry was tight, and things moved slowly as interest groups negotiated a balance amongst the impacts of change. Change often meant added overhead and, at the very least, a one-time cost effort to implement on the commercial side. Registries and registrars preferred to be hands-off when it came to how their domains were being used. But e-crime became big business during the 2000s. more
Internet freedom is under threat from governments around the world, including the United States, warned Vint Cerf on Monday. Andrew Feinberg reporting in the Hill: "Cerf, a computer scientist who was instrumental in the Internet's creation, now employed by Google as its 'Internet evangelist,' said officials in the United States, United Kingdom and Europe are using intellectual property and cybersecurity issues 'as an excuse for constraining what we can and can't do on the 'net.' 'Political structures ... are often scared by the possibility that the general public might figure out that they don't want them in power,' he said." more
A notice released by the Internet Corporation for Assigned Names and Numbers (ICANN) has disclosed that the Office of the Attorney General of the State of California has requested extensive information from the agency regarding the proposed sale and transfer of Public Interest Registry (PIR) from the Internet Society (ISOC) to Ethos Capital. more
NordVPN, a leading VPN service provider, has unveiled its first application featuring quantum-resilient encryption – a significant advancement in cybersecurity. Post-quantum cryptography support is currently available on NordVPN’s Linux client, with plans to extend this enhanced security to all applications by early 2025. more
Phishing researcher Gary Warner's always interesting blog offers some fresh perspective on clicking links on emails, as the crux of the phishing problem. Gary writes: "There is a saying 'if you give a man a fish, he'll eat for a day, but if you teach a man to fish, he can feed himself for a lifetime.' In the case of the Epsilon email breach the saying might be 'if you teach a man to be phished, he'll be a victim for a lifetime.' In order to illustrate my point, let's look at a few of the security flaws in the business model of email-based marketing, using Epsilon Interactive and their communications as some examples." more
It's still early days, but Singapore's approach to fiber deployment is beginning to pay off. In December 2007, Singapore announced a major program to get fiber deployed throughout their city state. A critical advantage of their approach was government mandated structural separation between the dark fiber layer deployed in the public right-of-way (a natural monopoly) and higher layer services (where competition is possible and highly desirable. more
So I heard about this ridiculous news the other day that now Australian customs officers have been given new powers to search incoming travelers' laptops and mobile phones for pornography, according to The Age. Really? Come on. Really? First the Internet filtering, a la porn wall, and now this? more
Anybody not involved in the telephone business will probably be surprised to find that the old TDM telephone networks are still very much alive and in place. The old technologies were supposed to be phased out and replaced by digital technologies. The FCC started talking about this before 2010. In 2013, Tom Wheeler, the FCC Chairman at the time, announced an effort to force the needed changes, which was dubbed the IP Transition. more
There is no doubt that LTE is going to take a prime position in broadband developments. With competitively priced services, innovative smartphones and an increasing range of very innovative apps this market is set to continue to boom. So how will all this impact the overall broadband market? ...this is not an 'us or them' issue between fixed and mobile broadband. As a matter of fact, the companies that are rolling out LTE are increasingly dependent on deep fibre rollouts as they need to handle massive amounts of data, to which the mobile infrastructure technology is not well-suited. more
One of the more interesting developments in this new year is the proposed changes in how, or perhaps more accurately, when the ICANN Board will undertake its activities. Historically, the ICANN Board has held monthly teleconferences (Special Board Meetings), with the exception of those months when the ICANN Board meet in person as part of a regional meeting (Regular Board Meeting). Approximately five years ago, the ICANN Board also began holding bi-annual retreats as part of their regular business activities. Interestingly, the proposed 2010 agenda for the ICANN Board has only four proposed Special Meetings... more
Despite deep geopolitical divides, the WSIS+20 outcome document was adopted by consensus, preserving a multistakeholder vision for the digital future while deferring controversial issues to a time more conducive to progress. more
With more and more stories coming in from all over the world about the prolific use of telecommunications to spy on what people are doing, the ball has been thrown back into the industry's court, to do something about it. In principle, ever since telecoms came into existence in the 1850s spying was high on the agenda of the people who started to use the new technology. In 1865 countries formed the International Telecommunications Union (ITU). This later became the first institution under the UN and all countries in the world are a member. more
The latest Domain Name Industry Brief published by Verisign reports 4.5 million domain names were added to the Internet in the first three months of 2011. According to the report, the first quarter of 2011 closed with a base of more than 209.8 million domain name registrations across all Top Level Domains (TLDs), or a 2.2 percent increase over the fourth quarter of 2010. Registrations grew by 15.3 million, or 7.9 percent year over year. more
While this article specifically discusses the issues of E911 service in the Canadian hinterlands, I fear that the same fiscal shell game is being played by wireless providers all over North America... Grant Robertson writes in The Globe and Mail: Every month when cellphone bills arrive, Northern Canadians are forced to pay for a 911 service they can't access. more
Recently, an article I wrote for Bitcoin Magazine talked about how we can use DNS underscore scoping to better abstract Lightning addresses and even create a de facto specification that could work on any resource (like a wallet or a smart contract) across all blockchains. more