In a world where the internet is central to communication, innovation, and economic growth, governing this vast digital ecosystem is a complex challenge. The multi-stakeholder approach, which involves governments, private entities, civil society, technical experts, and end-users, has long served as the cornerstone of Internet governance, ensuring that decision-making remains open and inclusive. more
A new report has been released by Analysys Mason suggesting recent proposals to regulate the global Internet will harm growth and innovation worldwide. The International Telecommunication Union (ITU) will hold a treaty conference, the World Conference on International Telecommunications (WCIT), in December 2012, which will revise a 1988 treaty, the International Telecommunication Regulations (ITR). more
When ICANN implemented the Uniform Domain Name Dispute Resolution Policy (UDRP) in 1999, the number of registered domain names were in the low eight digits. Registered domain names passed the first million in 1997. Today, they are in the first third of nine digits, and continuing to grow. In its newly released publication gTLD Marketplace Health Index (Beta) (July 21, 2016) ICANN offers through a couple dozen metrics a picture of the multiple parts that corporately go into making a healthy marketplace. It's "Beta" because the Health Index is a work in progress. more
When ICANN committed -- after no small debate -- to an open, rather than limited application process for new gTLDs, supporters likened it to "letting a thousand flowers bloom." On reveal day we got our first glimpse at the thousand (plus) flowers they promised. Now it falls to ICANN to tend this wild new garden... But now the fun of spreading the seeds has already begun to fade, and the hard work of turning this new, unprecedented flowerbed into a safe, innovative and worthwhile global garden has already begun. more
In 2015, ETECSA announced/leaked a plan to make ADSL service available in 50% of Cuban homes by 2020. I was skeptical. Doing so would mean investing a lot of money for obsolete technology between 2015 and 2020. They have recently announced the availability of ADSL connectivity at homes in portions of seven cities and, by December, they say some home connectivity will be available in every province. more
As soon as ETECSA began installing public access WiFi hotspots, black market resellers began sharing connections. They would connect a laptop to an ETECSA account then use pirated copies of Connectify, a connection sharing program running on the laptop, to create small WiFi hotspots of their own. At the time, ETECSA charged 2 CUC per hour online (two day's pay for many Cubans) and the re-sellers typically charged 1 CUC per hour. They broke even with two users and made a profit with more. more
On Friday 11 January 2013 the European Cybercrime Centre, EC3, officially opened its doors at Europol in The Hague. If something shone through from the speeches of the panel participants, it is that there are tight budget restraints and a strong wish to cooperate with the U.S., the Interpol centre in Singapore and Russia. Let me share my thoughts on expectations. more
Last week hundreds of privacy regulators, corporate officers, and activists gathered in Jerusalem, Israel for the annual Data Protection and Privacy Commissioner Conference. ... Many acknowledged that longstanding privacy norms are being increasingly challenged by the massive popularity of social networks that encourage users to share information that in a previous generation would have never been made publicly available for all the world to see. more
There's a lot of chatter about a recent study purporting to show that 29.1% of internet users has bought something from spam. As ITWire reported, "Marshal were not only interested in how many people were purchasing from a spam source, but also what goods and services they were buying. Perhaps less surprisingly this revealed that sex and drugs sell well online." But at downloadsquad, Lee Mathews discovered the shocking truth: "the survey only involved 600 people." more
World Wide Web founder Tim Berners-Lee speaking during an interview this week, warned Silicon Valley technology giants have grown so dominant they may need to be broken up. more
That is what happens when you base your telecommunications policies on the wrong foundations. The problems with the telecommunications industry in America go back to 1996 when the FCC decided that broadband in America should be classified as internet (being content) and that therefore it would not fall under the normal telecommunication regulations. Suddenly what are known as telecommunications common carriers in other parts of the world became ISPs in the USA. How odd is that? more
For those people tracking the evolution and deployment of DNSSEC or who are just interested in "DNS security" in general there is a great amount of activity happening next week at IETF 90 in Toronto. I dove into this activity in great detail in a recent post, "Rough Guide to IETF 90: DNSSEC, DANE and DNS Security", and summarized the activity in a Deploy360 post... more
The antivirus industry has been trying to deal with false positive detection issues for a long, long time - and it's not going to be fixed anytime soon. To better understand why, the physicist in me draws an analogy with Heisenberg's Uncertainty Principle - where, in its simplest distillation, the better you know where an atom is, the less likely you'll know it's momentum (and vice versa) - aka the "observer effect". more
In a note released this week, Google announced that it will begin publicly sharing National Security Letters (NSLs) it receives that have been freed of nondisclosure obligations either through litigation or legislation. more
Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about. more