/ Most Viewed

Security Experts, Privacy Advocates Hopeful Rollout of 5G Can Eliminate Surveillance Vulnerabilities

Security experts and privacy advocates see the rollout of the new 5G wireless network as a possible solution to eliminate surveillance vulnerabilities that allow spying on nearby phone calls. more

Rodney Joffe Wins a Well-Deserved Mary Litynski Award

Every year M3AAWG gives an award for lifetime work in fighting abuse and making the Internet a better place. Yesterday at its Dublin meeting they awarded it to Rodney Joffe, who has been quietly working for over 20 years. I can't imagine anyone who deserves it more. more

ICANN in Hollywood: Foreshadowing a Happy Ending?

As we arrived in Hollywood -- the land of happy endings -- ICANN had just given us cause to hope that the ICANN accountability process might get its own Hollywood ending, despite a fitful start. As one who's been critical of ICANN management's heavy-handed attempts to control the accountability process, it's only appropriate to give credit where credit is due. In accepting the community's strenuous -- and nearly unanimous -- calls for a cross-community working group to lead the process of improving ICANN's accountability mechanisms, ICANN management says it's now prepared to follow the community's lead, rather than dictating and constraining it. more

DNSSEC Signed ROOT by 1 July 2010

Mehmet Akcin writes: As announced today as part of RIPE meeting in Lisbon, Portugal by Joe Abley, DNS Group Director at ICANN, and Matt Larson, Vice President of DNS Research at VeriSign, in their presentation (Page 25), DNSSEC for the root zone is proposed to be fully deployed by July 1, 2010. The Draft Timeline suggests Root zone being signed by December 1, 2009 while initially staying internal to ICANN and VeriSign. The incremental roll out of the signed root would then take place from January until July 2010. more

Building a Secure Global Network

Recently, the DNS has come under an extensive attack. The so-called "DNSpionage" campaigns have brought to light the myriad methods used to infiltrate networks. These attacks employed phishing, system hopping via key exfiltration, and software zero day exploits, illustrating that many secure networks may not be fully protected. more

Hyperconvergence, Disaggregation, and Cloud: The Foggy Future of Network Engineering

The world of networking tends to be bistable: we either centralize everything, or we decentralize everything. We started with mainframes, passed through Lotus 123 hidden in corners, then to mini's and middleware, then to laptops, and now to the cloud, to be followed by fog. This particular cycle of centralization/decentralization, however, has produced a series of overlapping changes that are difficult to decipher. You can somehow hear someone arguing about disaggregation and hyperconvergence through the fog -- but just barely. more

Choose a gTLD for Love or for Added Value?

The decision to bid for a new gTLD can be driven by reason or by love. Either the applicant practices strategic and financial valuation, or the applicant falls for an idea implicit in the gTLD. The second group had better be very lucky or have some motivation besides profit. They enjoy little chance of economic viability. Worse, they follow up their poor initial selection with similar bad calls about their marketing message. more

What’s Abusive in Registering Domain Names, and the Reverse?

The two major providers of arbitration services for adjudicating cybersquatting complaints under the Uniform Domain Name Dispute Resolution Policy (UDRP), the World Intellectual Property Organization (WIPO) and Forum, issue daily lists of decisions. In approximately 90% of those disputes, the registrations cannot be described as anything less than mischievous in acquiring second level domains incorporating well-known or famous marks. more

The Impacts of Hurricanes Harvey, Irma, and Maria on the Internet

The devastation caused by several storms during the 2017 Atlantic hurricane season has destroyed neighborhoods and taken lives across a number of Caribbean island nations including Texas and Florida in the United States. Senior Director of Internet Research & Analysis at Oracle Dyn Global Business Unit has posted a blog that takes a look at the impacts. more

New Paper Proposes ‘Attested DNS’ to Secure Domain Names with Trusted Hardware

Azure researchers propose attested DNS, a system that embeds confidential computing into the internet's naming infrastructure. By binding domain names to trusted hardware and software, it enhances service verification while maintaining compatibility with existing web technologies. more

Sanctions & The Regulation of IP Transfers

The early stages of internet development operated in a culture of independence from outside influence. In fact, as though to commemorate the spirit of the times, in 1996, John Perry Barlow wrote "A Declaration of the Independence of Cyberspace." In it, he told governments they "have no sovereignty where we gather." He went on to state, "Ours is a world that is both everywhere and nowhere, but it is not where bodies live." more

Why Over Compliance With Sanctions at Internet Infrastructure Level Can Have Devastating Effects on Ordinary People

On Friday, Mykhailo Fedorov, Ukraine's digital transformation minister, asked Cloudflare and Amazon to stop serving Russian web resources and protecting Russian services. He said in a tweet that Ukraine was "calling on Amazon to stop providing cloud services in Russia." He also said that "Cloudflare should not protect Russian web resources while their tanks and missiles attack our kindergartens." more

Don’t Make the Internet Safe for Monopolies

This week I'm going to Washington to argue against regulating Internet access as if it were phone service. Twenty years ago I was there for the same reason. My concern now as it was then is that such regulation will damage the economy and reduce opportunity by stifling innovation and protecting the current dominant players from the startups which would otherwise threaten them. more

Network Dis-Aggregation and SDN: Different, But Related

Two of the hottest trends in networking today are network dis-aggregation and SDN. This is great for many reasons. It's also confusing. The marketing hype makes it hard to understand either topic. SDN has become so vague that if you ask 10 experts what it means, you are likely to get 12 different answers. Network dis-aggregation seems straightforward enough until it gets confused with SDN. We need to take a step back. In a recent Packet Pushers blog post; I start with a simple explanation of each of these trends and then map how they interact. more

Bringing a Responsible Closure to the gTLD Implement Process

Last Friday ICANN released an updated new generic Top-Level Domain (gTLD) Applicant Guidebook that appears to have taken a number of positive steps toward closing the divide between the ICANN Board and the Governmental Advisory Committee (GAC). One of the more important changes to the Applicant Guidebook was the following text... more