/ Most Viewed

Minimized DNS Resolution: Into the Penumbra

Over the past several years, domain name queries - a critical element of internet communication - have quietly become more secure, thanks, in large part, to a little-known set of technologies that are having a global impact. Verisign CTO Dr. Burt Kaliski covered these in a recent Internet Protocol Journal article, and I'm excited to share more about the role Verisign has performed in advancing this work and making one particular technology freely available worldwide. more

China’s World Internet Conference to Be Held in November

China's high-profile "World Internet Conference" will be held next month where more than 1,000 representatives from tech firms and regulators are expected to attend. The event will be held from Nov. 19-21 in Wuzhen, Zhejiang Province. The conference is planned to cover topics including global Internet governance, mobile Internet, cross-border e-commerce, cyber security and terrorism.  more

Defending Against the Hackers of 1995

Two factor authentication that uses an uncopyable physical device (such as a cellphone or a security token) as a second factor mitigates most of these threats very effectively. Weaker two factor authentication using digital certificates is a little easier to misuse (as the user can share the certificate with others, or have it copied without them noticing) but still a lot better than a password. Security problems solved, then? more

The Challenge of Access to Safe Internet Pharmacies and Medicines During Pandemics

With 300+ sessions and over 7,800 participants from 158 countries across every time zone, RightsCon Online 2020 (July 27-31) demonstrated the importance of convening people worldwide to bring about positive changes in a time of crisis. The Dahdaleh Institute for Global Health Research (York University, Canada) organized a panel of diverse experts and academics to discuss "Promoting human rights and access to safe medicines during pandemics: The critical role of Internet pharmacies." more

We Need to Disconnect from Facebook Right Now

The smartphone has effectively transformed us into cyborgs, we have in our hands a highly efficient computing device equipped with a photo and video camera, microphone, GPS, accelerometer, gyroscope, magnetometer, light and proximity sensors, as well as other features that allow creation of increasingly useful, impressive and addictive applications. more

Government Policies Beyond Broadband

The telecom infrastructure decisions we are now facing have very little to do with developments or the need for services in 2009 or 2010. They are more related to where the digital economy is taking us in the future. This is well beyond the time needed to kick-start sluggish economies. more

Schmidt: Handing over Control of Internet, DNS to the UN a Disaster, Will Divide the Internet

During the Mobile World Congress 2012, Google's executive chairman Eric Schmidt, today warned against United Nations' treaty aimed at bringing more Internet regulation. "That would be a disaster... To some, the openness and interoperability is one of the greatest achievements of mankind in our lifetime. Do not give that up easily. You will regret it. You will hate it, because all of a sudden all that freedom, all that flexibility, you'll find it shipped away for one good reason after another." more

Dutch ISPs Admit to Using Deep Packet Inspection

Digital Civil Rights in Europe reports: "During an investors day on 10 May 2011 in London, Dutch Internet service provider KPN admitted to using deep packet inspection (DPI) technology, to determine the use of certain applications by its mobile internet customers. Vodafone soon followed with an announcement that it used this technology for traffic shaping. The Dutch minister of Economic Affairs within days announced an investigation into KPN's practices and promised to publish the results within two weeks." more

A Paradigm Shift in Telecom Services: TSP Competing With OTTs in the Era of RCS

Telecom operators are challenging OTT platforms by deploying Rich Communication Services. This reversal of roles prompts fresh regulatory scrutiny, revives the case for network neutrality, and demands a risk-based approach to preserving digital competition. more

Turkish Parliament Approves Internet Bill, Lets Government Block Websites, Seize Personal Data

Turkey's Parliament has passed a bill that includes controversial arrangements concerning the protection of online privacy despite concerns raised by the European Union as well as Turkish NGOs and opposition parties, according to a report today by Turkey's Daily News. more

Twitter’s t.co Domain Outage Caused by Human Error

Declan McCullagh reporting in CNET: "Twitter last year began to abbreviate all hyperlinks using its t.co domain name -- which had the side effect of introducing a central point of failure where none existed before. That failure happened last night [Sunday Oct 7] around 11:30 p.m. PT when t.co went offline, meaning millions of Twitter users received 'non-existent domain' errors when trying to follow links." more

Scotland’s New TLD .scot Goes Live

The new TLD for Scotland, .scot, has been launched. About 50 sites run by "launch pioneers" are expected to go live on Tuesday. Among those who have signed up for a new domain are the Scottish government, referendum campaigners Yes Scotland and Better Together, WWF Scotland, NHS Scotland and Scouts Scotland. The .scot domain is one of a number of new top-level domains going live this year including .wales, .london, .berlin and .NYC. more

A Flurry of CAN-SPAM Activity: Is It Meaningful?

Our four-year old oft maligned anti-spam legislation in this country, the CAN-SPAM act, has seen an uptick of activity this past week. Melinda Krueger sums up the sentiments of many in the anti-spam community in her Email Insider column today when she says, "there is no provision in the act against sending unsolicited email as long as you comply with the rest of the act. The motivation of the act was more to make voters feel politicians were doing something about this annoying problem." more

Doing More to Address Child Sexual Abuse Materials Online

For all of us at Public Interest Registry, working to remove child sexual abuse content from the Internet isn't just a part of our work; it's our moral duty. As stewards of the .ORG community, addressing the problem head on is the only option compatible with our values. Talking about Child Sexual Abuse Materials (CSAM) is challenging and uncomfortable. It's also far too important, and prevalent, of a problem to ignore. While it's impossible to know exact numbers, online CSAM is a major, rapidly growing crisis. more

Is There Really a Mobile Malware Pandemic?

Much of the discussion regarding mobile security revolves around the growing "pandemic" of mobile malware. It's not uncommon to see headlines reporting the discovery of large numbers of new malware samples. However, as Google recently pointed out, with quite a bit of data to support them, there's little discussion of real world impact of these discoveries. This raises a number of relevant questions. Is the average user likely to be infected? Where does this malware come from? These are questions that deserve analysis and thoughtful responses. more