There are some who see the regulation of social media platforms as an attack on the open internet and free speech and argue that the way to protect that is to let those platforms continue to self-regulate. While it is true that the open internet is the product of the same freedom to innovate that the platforms have sprung from, it is equally the product of the cooperative, multi-stakeholder organisations where common policy and norms are agreed. more
Are there countries whose situations worsened with the arrival of the internet? I've been arguing that there are lots of examples of countries where technology diffusion has helped democratic institutions deepen. And there are several examples of countries where technology diffusion has been part of the story of rapid democratic transition. But there are no good examples of countries where technology diffusion has been high, and the dictators got nastier as a result. more
With ICANN's announcement that the application window for new TLDs will be opening in January 2012 there has been an influx of media coverage directed at our bid for .ECO, as well as the bids of many other organizations the world over. To date, many articles related to our bid have drawn immediate reference to the involvement of Mikhail Gorbachev and Al Gore. more
On January 1, 2021, the United Kingdom officially ended the transition period and is no longer subject to European Union rules. The U.K. had been part of the EU for 47 years, or almost two generations. Comprehending the impact, the changes, the new ruling, and compliance will take some time. But in a world where online shopping, online banking, and communication is growing at lightning speed, we need clarity on key digital assets - the basic domain name. more
By now, we are all exposed to the narrative of how the Internet is no longer a safe place. It is full of bots, misinformation, abuse and violence; it is a space that has been overtaken by terrorists and extremists. The Internet is weaponized to influence elections, undermine democracies, and instill fear in its users. That's the story we are told. No one can deny the swift change that is taking place in global politics. The "brave new world" that has emerged is, currently, based on isolation and fear. more
Following in the footsteps of Lethic, Waledac and Mariposa, yet another botnet has been taken offline. Not completely, though, it was only a partial disconnect. The Zeus botnet, also known as Zbot, is a trojan password stealer that captures passwords and sends them to the attacker. more
Sometime later this year - at a venue still unknown - something short of a thousand people from around the world will gather together and engage in a now meaningless ritual almost exactly like they did in 1924. In the 1990s the name of the gathering was changed from the CCITT Plenary Assembly to a World Telecommunication Standardization Assembly (WTSA). more
Shadow IT -- the use of unsanctioned software and services by employees -- is a problem. It's a big one. According to Forbes, 72 percent of executives don't know how many "shadow" apps are being used on their network. Beyond overloading network resources and impacting data compliance, there is also the real threat of security breaches from unapproved apps. Managing IT you can't see is no easy task, but fortunately it's not impossible. Here are five tips to help bring light to the shadows. more
I think every client who is considering building a fiber network asks me how long the fiber will last. Their fear is having to spend the money at some future point to rebuild the network. Recently, my response has been that fiber is a hundred-year investment -- and let me explain why I say that. We're now seeing fiber built in the 1980s becoming opaque or developing enough microscopic cracks that impede the flow of light. more
This post I've been pondering on for a long time, but never found the right angle and perhaps I still haven't. Basically I have these observations, thoughts, ideas and a truckload of questions. Where to start? With the future prospects of us all. Thomas Picketty showed us the rise of inequality. He was recently joined by Robert J. Gordon who not only joins Picketty, but adds that we live in a period of stagnation, for decades already. "All great inventions lie over 40 years and more behind us", he points out. more
The Sunday Herald reported on Sunday that Best Western was struck by a trojan attack that lead to the possible compromise of about 8 million victims. There is some debate as to the extent of the breach and not a small amount of rumor going around. I'm not entirely disposed to trust corporate press releases for the facts, nor am I going to blindly accept claims of security researchers whose first call is to the PR team when discovering a problem. That said, here is what seems to be the agreed upon facts... more
EU lawmakers are pushing for additional negotiations to strengthen a proposed data transfer agreement between the European Union (EU) and the United States. They argue that the current agreement still has shortcomings that must be addressed. The potential delay in reaching an accord is concerning for the thousands of companies that rely on the agreement. more
Once you've determined that you can trust the signer of a message, as we discussed in part 3, it's easy to extrapolate that various portions of the message are equally trustworthy. For example, when there's a valid DKIM signature, we might assume that the From: header isn't spoofed. But in reality, DKIM only tells us two basic things... more
Edward Mc Nair, executive director of the North American Network Operators Group (NANOG), delivered the keynote at the seventeenth regional meeting of the Caribbean Network Operators Group (CaribNOG), held from April 10 to 12 at the Hilton in Bridgetown, Barbados. McNair's keynote focused on the important role that network operator groups, or NOGs, play in building an Internet that serves the specific needs of the people in the region. more
Last week during the ICANN meeting in Barcelona I attended a short presentation from the Internet Watch Foundation (IWF). Their mission is pretty simple: ...eliminate child sexual abuse imagery online. Fortunately, the presentation I was at did not include any of the actual material (which would have been illegal anyway) but even without seeing any of it the topic is one that I think most people find deeply disturbing. more