/ Most Viewed

Authentication Methods Used in the RIPE Database

Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more

Google’s “Deeply Disturbing Invasion of Privacy” Being Investigated by Connecticut AG

What happens to companies when they get too big for their own good? Do they inadvertently do things that potentially harm our privacy (think Facebook)? Or, do they simply make mistakes that violate our privacy? Well, last month Google revealed that its Street View cars "mistakenly" captured content flowing over wireless networks -- a potential invasion of privacy. more

The TLD Operator Webinar Transitions to the DNA University

Readers of my posts will have noticed that we've been working over the last two months to launch the TLD Operator Webinar which was held recently. Its purpose was to unite all new TLD applicants and collectively share our experiences in order to build momentum in the industry and support each other in our pursuits. With more than 300 registrations and 40 percent of all new TLDs attending, we were humbled and overjoyed with the success -- validating our 'educated guess' that there was a global appetite for information to assist new TLD applicants. more

Business Logic Vulnerabilities Are the Hidden Menace in Modern Software

The first things that usually come to mind when talking about software development risks are bugs and security issues that have not been detected or those that have been discovered but left unaddressed. Some may also point out poor code quality reviews and the use of third-party components and dependencies laced with malicious code. more

ICANN Suspends Digital Archery

Today, ICANN announced the temporary suspension of the Digital Archery system. ARI Registry Services applauds this development, as it's a clear signal ICANN is listening, considering and acting upon constructive feedback from the community. We encourage ICANN to not only reassess the Digital Archery system, but also the need to proceed with batching at all. more

Google Not the Only Company Testing Wireless Access by High-Altitude Balloons

Oceus Networks Inc., a mobile 4G LTE broadband networking provider, recently demonstrated the efficacy of a deployable 4G LTE solution on a high-altitude balloon platform, which can be used to rapidly provide broadband coverage and communications services to first responders within the first 72 hours following an emergency or natural disaster. more

AFNIC Publishes New Issue Paper on “the Secondary Market in Domain Names”

Loic Damilaville writes to report: Today AFNIC is publishing its new issue paper on the secondary market in domain names. The paper -- written to inform individuals as well as businesses -- gives a detailed account of the concept of "secondary market", the valuation mechanisms used, and the main players involved. The secondary market covers over-the-counter sales of already registered domain names, as well as the market in "second-hand domain names" and the ecosystem made up of the various players involved in these matters. more

With the New US CTO, Why Not a New OCA: Office of Connectivity Advocacy

We need a positive strategy for assuring connectivity. Instead of trying to fix telecom we should be working to take advantage of what we have and build vital, even if mundane applications like telemedicine and broaden our access to information while empowering communities. By realizing the value in our existing infrastructure and encouraging the creativity we can provide immediate benefits to our economy and our safety. We need a "Connectivity Strategy" with a champion... more

Complete Internet Shutdown Reported in Syria

While Syria's Internet disruptions in the recent past have been linked to Government's efforts to prevent cheating during national high school exams, today's complete Internet shutdown reported by Dyn Research is unknown and does not appear to be exam-related. more

Want to Share Info with the DNSSEC Community? ICANN57 DNSSEC Workshop Seeking Proposals by Sept 15

Do you have information or an idea you would like to share with members of the broader DNS / DNSSEC community? Have you developed a new tool that makes DNSSEC or DANE deployment easier? Have you performed new measurements? Would you like feedback about a new idea you have? Would you like to demonstrate a new service you have? If so, we're seeking proposals for the DNSSEC Workshop to be held at ICANN57 in Hyderabad, India, in early November 2016. more

ICANN to Manage Internet Time Zone Database

The Internet Corporation for Assigned Names and Numbers (ICANN) today announced that it has taken over operation of an Internet Time Zone Database that is used by various major computer systems. ICANN agreed to manage the database after receiving a request from the Internet Engineering Task Force (IETF). The database contains time zone code and data that computer programs and operating systems such as Unix, Linux, Java, and Oracle rely on to determine the correct time for a given location. Modifications to the database occur frequently throughout the year. more

Google’s Simple Home Page Now Patented

Ryan Tate of Valleywag writes: "After a five-and-a-half-year fight, Google and its attorneys have managed to convince federal bureaucrats to bestow a patent on the company's iconic home page. We always thought the page was brain-dead simple, but apparently it's an innovative 'graphical user interface. ...In other words, subject to how the patent is enforced, Google owns the idea of having a giant search box in the middle of the page, with two big buttons underneath and several small links nearby." more

Video: Interview with Jari Arkko at IETF 96 in Berlin

Would you like to understand the major highlights of the 96th meeting of the Internet Engineering Task Force (IETF) last month in Berlin? What were some of the main topics and accomplishments? How many people were there? What else went on? If so, you can watch a short video interview I did below with IETF Chair Jari Arkko. more

Europol Warns on the Criminal Usage of ChatGPT and Its Implications for Law Enforcement

Europol's Innovation Lab released a Tech Watch Flash report on Monday, sounding the alarm on the potential misuse of large language models such as ChatGPT. Entitled 'ChatGPT - the Impact of Large Language Models on Law Enforcement,' the report provides an urgent overview of the implications of ChatGPT for criminals and law enforcement, as well as an outlook of what may still be to come. more

Now Available: Worldwide and Local Current Starlink Performance

The blue dot circled is our dish in the center of Vermont. Volunteers run software that collects statistics every 15 minutes and uploads them to update the tables and the map at https://starlinkstatus.space. You can see below that we have been averaging download speeds of 143Mbps, upload around 12Mbps, and ping times of 43ms. Below, you can see our most recent updates, including the percentage of time our dish was obstructed (0% happily). There are also tables with country and region-wide averages. more