/ Most Viewed

Unraveling the Layers of Internet Fragmentation: A Deeper Dive Into Global Connectivity

During the ICANN79 in San Juan, Puerto Rico, in March 2024, the North America School of Internet Governance (NASIG 2024) convened with an over-encompassing theme, "Confronting Truth, Trust, and Hope in Internet Governance." A pivotal panel discussion titled "Can We Survive Digital Fragmentation?" underscored the essentiality of global connectivity and the urgency to understand and address the layers of fragmentation impacting the internet's universal fabric. more

New Ad Fraud Schemes Utilize Alpha-Numeric Domains

The breach of the Democratic National Committee e-mail system and a massive digital advertising fraud believed to be run by alleged actors in Russia share a common thread beyond their ability to capture the news cycle. Although each event targeted a different weakness in brand/online security platforms, the common denominator is the use of fraudulent domain names. more

Business Logic Vulnerabilities Are the Hidden Menace in Modern Software

The first things that usually come to mind when talking about software development risks are bugs and security issues that have not been detected or those that have been discovered but left unaddressed. Some may also point out poor code quality reviews and the use of third-party components and dependencies laced with malicious code. more

Is There a Role for ICANN in Satellite Internet Governance?

A recent invitation to participate in a webinar to discuss ICANN's Role in Satellite Internet Governance as an enabler of UN Sustainable Development Goal (SDG) 9 prompted me to consider this issue. As a legal scholar with expertise in telecommunications infrastructure, I had much to say and discuss about the new mega-constellation phenomenon and its potential role in achieving SDG9, which, for me, is a multifaceted and fascinating subject. more

Rewiring Internet Governance: Summing up ICANN Policy Walking Backward Into the Future (Part 4)

So-called "globalization" and its corollaries which are trade policy and, thus, foreign policy intersect with telecommunications. This ought to be obvious and it is not new. For example, in December 2011, OECD adopted its "Recommendation of the Council on Principles for Internet Policy Making", the latter which apparently connects with an earlier U.S. cyberspace strategy based on something called the "Internet Freedom Agenda" dated 21 January 2010... more

Work in Progress: Preparing the Next Round of New gTLDs

There are now more than a thousand new Internet suffixes alongside "the originals" (not talking vampires here, but rather .COM et al). These additional web address endings are called "new gTLDs". Since Internet technical coordinator ICANN's 2012 call for applications for the creation of new gTLDs, and their roll-out starting in 2014 when suffixes such as .BARCLAYS (brand TLD), .NYC (geo TLD) and .SKI (generic TLD) became active, the question of another round of applications has been asked repeatedly. more

EU Lawmakers Call for Further Talks to Strengthen Proposed US Data Transfer Pact

EU lawmakers are pushing for additional negotiations to strengthen a proposed data transfer agreement between the European Union (EU) and the United States. They argue that the current agreement still has shortcomings that must be addressed. The potential delay in reaching an accord is concerning for the thousands of companies that rely on the agreement. more

Transparency Meets Sustainability: Announcing the SDIA Open Data Hub

Last month, the Sustainable Digital Infrastructure Alliance (SDIA) announced our Open Data Hub, a resource that's meant to boost transparency, trust, and data availability to help researchers, industry, and society realize a sustainable digital economy. It is essentially our answer to the challenge recognized across the sector: that the lack of reliable data is one of the most foundational issues we face in creating a sustainable ICT ecosystem. more

New gTLD Community Objection Standing Analysis

The notion of community has been debated since the inception of the ICANN New gTLD Program. However, as far as we know no one has yet taken a holistic approach to analyzing the wealth of information generated by the experts who participated in the ICANN New gTLD community objection process. As a community applicant for .eco on behalf of the environmental community, Big Room Inc. has a keen interest in understanding how independent experts are interpreting the ICANN notion of community. more

3 Billion Internet Users by End of 2014, Two-Thirds from Developing World

Releasing new statistics today, the United Nations International Telecommunications Union (ITU) announced that by end of 2014, there will be nearly three billion Internet users -- two-thirds of them from the developing world -- with mobile-broadband penetration approaching 32 per cent. Moreover, people from developing countries make up for more than 90 per cent of those who are not yet using the Internet. more

Loon Balloons Restore Internet After a Massive Earthquake Strikes Remote Parts of Peru

On Sunday, when a magnitude 8.0 earthquake struck remote parts of Peru’s Amazon region, at the request of the government of Peru and Telefónica, Alphabet re-directs a group of its Loon balloons to the impacted area to restore Internet access. Within 48 hours, people on the ground had wireless broadband communication, reports Alphabet. more

SEC Asks Companies to Disclose Cyberattacks

I came across an interesting article on Reuters today: "U.S. securities regulators formally asked public companies for the first time to disclose cyber attacks against them, following a rash of high-profile Internet crimes..." This is a pretty big step for the SEC. Requiring companies to disclose when they have been hacked shifts the action on corporations from something voluntary to something that they have to do. The question is do we want to hear about everything? more

Authentication Methods Used in the RIPE Database

Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more

Understanding the Brazilian Court Decision to Arrest Google’s Representative

Brazil has been on the news lately, and not for good reasons: an electoral judge order the arrest of Google's Director in Brazil for not complying with a court decision that ordered the removal a YouTube video with allegedly defamatory content. A lot has been said about this, but it seems that many people got it wrong, so let's recap some of the misinterpretations that circulated, specially those at the EFF website. more

Beyond WHOIS: CircleID and Edgemoor Research Institute Second Event on ‘Filling the Gaps’

Experts at a CircleID and Edgemoor Research Institute webinar debated the challenges of domain registration data access in a post-GDPR world. Panelists explored the tension between privacy laws and legitimate data requests, the role of automation in disclosure decisions, and the need for a scalable, trust-based framework to balance compliance, cybersecurity, and enforcement interests. more