/ Most Viewed

Aircell vs. VoIP

Last week American Airlines launched their Aircell wireless Internet access on a limited number of flights. It didn't take long before a few folks tried to make voice and video calls (in violation of Aircell's terms-of-service according to their PR folks), and it didn't take long before someone figured a way around their voice/video blocking efforts. more

ICANN and the GAC - Lessons Learned Since Cartagena

Experience is the best teacher. In the interest of capturing lessons learned (and avoiding the repetition of hard experiences needlessly), it is worth highlighting what the interactions between the ICANN Board and the Governmental Advisory Committee (GAC) since Cartagena have taught. more

Email Service Providers and the Coming Changes

Yesterday I talked about how I'm hearing warnings of a coming paradigm shift in the email industry. While these changes will affect all senders, Email Service Providers (ESPs) in particular are going to need to change how they interact with both ISPs and their customers. Currently, ESPs are able to act as "routine conveyers." The traffic going across their network is generated by their customers and the ESP only handles technical issues. more

U.S. Government Announces Intent to Transition DNS Functions to Global Community

U.S. Commerce Department's National Telecommunications and Information Administration (NTIA) took a historic step today announcing "its intent to transition key Internet domain name functions to the global multistakeholder community." more

U.S. Cyber Security: Blurred Vision

It has been beaten, butted, and batted around quite a bit in the past few weeks -- let's look at a rough timeline of political issues which bring me to this point. Let's look at the power struggle (I prefer to call it confusion) in the U.S. Government with regards to "Cyber Security" -- in a nutshell. In the latter part of 2008, the U.S. House of Representatives Homeland Security Committee determined that DHS was not capable of providing proper critical infrastructure protection (and other Cyber protection capabilities) due to a number of issues. This may well be a political maneuver, or it may well actually have merit. more

IPv6 RIPEness: More Smaller and Younger Organizations Deploying IPv6

The number of RIPE NCC members [also referred to as Local Internet Registries (LIRs)] that have an IPv6 allocation continues to grow -- in absolute terms as well as in percentages. 46% of all RIPE NCC members have one or more IPv6 RIPEness stars. ... Do new members pick up IPv6? Are older members with more experience, well-established businesses and customer base dominating IPv6 RIPEness scores? And what about the size of a member? Are small and large members adopting IPv6 in equal proportions? In this article we look into answering these questions. more

Starlink Broadband Service – More on the Beta Plus Exciting Video

If you have last-generation satellite internet access, broadband from a wireless ISP (WISP), or even satellite television from DISH or DIRECTV, an installer came and carefully aimed a dish antenna for you. Starlink, a broadband access service from Elon Musk's SpaceX company, reimagines the install process and, in most cases, eliminates the need for an installer. The Starlink dish can sit on the ground or the peak of your roof; more importantly, it aims itself, as you see in the accompanying video. more

Spotlight on African Contributions to Internet Governance Discussions (Part 1: NETmundial)

The internet affects every individual in this world whether directly or indirectly. For example, a medical professional somewhere in Goma, Congo might access the internet to read and post reviews to current medication available and this might have an impact on the kind of medication that he/she recommends to the patient, whether the patient has access to affordable internet or not. Since the internet affects everyone, Africans citizens who are aware of internet governance discussions, expect African stakeholders to engage in these discussions. more

Google Reveals Top 10 Malware Sites From Its Index

While scanning its index, Google in the last two months reports to have found more than 4,000 different websites suspected of distributing malware by massively compromising popular websites. "Of these domains more than 1,400 were hosted in the .cn TLD. Several contained plays on the name of Google such as goooogleadsence.biz, etc.," says Google's security team member, Niels Provos, in a blog post today. more

Weekend Cyberattack on Pakistani bank reported to be a Historic $6 Million Loss, Bank Denies Claim

Karachi-based Bank Islami revealed Saturday morning that it had detected abnormal transactions resulting in 2.6 million Pakistani rupees, roughly $19,500 and precautionary steps where taken immediately. more

Digital Identity and Branding: The Five Most Common Mistakes in Naming

The U.S. is a total hotbed for Startups. Over the course of the last year, venture capital firms invested $69.11 billion in U.S. startups. Now is an exciting time where there is more ingenuity and entrepreneurial efforts than ever before. And of course every entrepreneur's dream is to have a successful idea and "make it". However, a startup's name and its associated digital identity are often not as thought out as they should be. more

An ITU Cut and Paste Job for New TLDs Could Cost $150k

It was with great interest that I read a recent announcement about a plan by the International Telecommunications Union (ITU) to publish template answers on a wiki for the 22 questions relating to registry technical operations contained within ICANN's new Top-Level Domain Applicant Guidebook. As someone who has spent the best part of six years following the development of the program (witnessing first-hand each evolution of the Applicant Guidebook) my first thought was one of bemusement... more

Big Regional Network Outages

T-Mobile had a major network outage last week that cut off some voice calls and most texting for nearly a whole day. The company's explanation of the outage was provided by Neville Ray, the president of technology... In plain English, the electronics failed on a leased circuit, and then the backup circuit also failed. This then caused a cascade that brought down a large part of the T-Mobile network. more

Registry Lock - or EPP With Two Factor Authentication

For the last couple of years, the most common attack vector against the DNS system is the attack against the registrar. Either the attack is on the software itself using weaknesses in the code that could inject DNS changes into the TLD registry, or social engineering the registrar support systems and the attacker receives credentials that in turn allows the attacker to perform malicious changes in DNS. DNSSEC is the common security mechanism that protects the DNS protocol, but by using the registrar attack, any changes will result in a proper working DNS delegation. more

Google License to Operate in China Renewed

Google Inc. today announced via its official blog that the Chinese government has renewed its license and that it will continue to operate in China. Google further notes: "We currently automatically redirect everyone using Google.cn to Google.com.hk, our Hong Kong search engine. This redirect, which offers unfiltered search in simplified Chinese, has been working well for our users and for Google. However, it's clear from conversations we have had with Chinese government officials that they find the redirect unacceptable -- and that if we continue redirecting users our Internet Content Provider license will not be renewed (it's up for renewal on June 30). Without an ICP license, we can't operate a commercial website like Google.cn -- so Google would effectively go dark in China." more