/ Recently Commented

The Russian Anti-Satellite Demonstration – a Month Later

On November 15, Russia demonstrated its ability to destroy an orbiting satellite, Cosmo 1408, by hitting it with a direct-ascent rocket. In an earlier post, I noted the anti-satellite demonstration and speculated on why Russia may have done it and why the Chinese had not condemned it. In this post, I’ll look at the evolution of the resulting debris cloud and say more about the possible motivation.  more

Watch the Online Events Series on “Digital Citizenship and Bill of Rights”

DataPrivacyBR and the Internet Integrity Task Force, IITF, in collaboration with CircleID and IGF recently held 2 online events focusing on digital citizenship, governance, and a digital bill of rights and responsibilities. A diverse group of high-level presenters and speakers spanning all stakeholder groups, addressed questions such as: What are the foundational principles that define and protect the rights and responsibilities of digital citizenship? Do existing internet governance models take digital rights sufficiently into account? Are there alternatives to business models that are based on digital exploitation and servitude? Why do we need a digital Bill of Rights and Responsibilities and how can it be created? more

RealTimeML:  Email Send Time Optimization for Supply Chain Bottlenecks

Look for this trio of email-related organizations MessageGears, Validity, Vidi-Emi, to become trailblazers in the RealTimeML Email landscape. This article will examine the nascent concept of utilizing RealTimeML to optimize for open rates and ultimately engagement rates by using a SendTime Email Optimization model. The model will infer RealTimeML predictions for optimal engagement rates, which provides enormous value throughout your current supply chain. Additionally, we will share ongoing time trials to serve the model efficiently. more

Ongoing Community Work to Mitigate Domain Name System Security Threats

For over a decade, the Internet Corporation for Assigned Names and Numbers (ICANN) and its multi-stakeholder community have engaged in an extended dialogue on the topic of DNS abuse, and the need to define, measure and mitigate DNS-related security threats. With increasing global reliance on the internet and DNS for communication, connectivity and commerce, the members of this community have important parts to play in identifying, reporting and mitigating illegal or harmful behavior, within their respective roles and capabilities. more

Incumbents Fight Broadband Improvement

There was a recent article in the Bangor Daily News about Charter Communications fighting a move by small towns in Maine to bring fiber broadband. To anybody who has been in the business for a while, this is nothing new. The big cable companies and telcos have fought municipal broadband for decades. The article highlights a recent public meeting in the small town of Leeds, a town of under 2,300. The town was hoping to partner with Axiom Technologies, a nearby ISP, to provide fiber broadband. more

China Using Cybertechnologies to Expand Their Political Cloud

A few months ago, I mentioned that China’s social code would also be expanded to companies who want to deal with China. I have come across information that shows that China is indeed serious about this. China’s cyberspace regulator has proposed requiring companies pursuing share listings in Hong Kong to apply for cybersecurity inspections if they handle data that concerns national security. Large internet platforms planning to set up headquarters, operating or research centers abroad will have to submit a report to regulators. more

JD Falk – a Decade Afterwards

I can still hear it. ‘Hee hee’. That’s good. We all have unique laughs, but few are distinctive. Fewer yet belly the true nature of the human being issuing them. British insult comedian Jimmy Carr has one such laugh, a tri-tone ‘dah dah DUH,’ rising on the third expulsion. It has a bell-like quality, ringing, embodying the deft touch that Don Rickles had of insulting while loving, something Carr has mastered. It lets you know that despite him having just said something shocking and horrid, he is laughing with, never at, reassuring the target, ‘all is well.’ more

Big Internet Outages - There Is No Such Thing as a Routine Software Upgrade

Last year I wrote about big disruptive outages on the T-Mobile and the CenturyLink networks. Those outages demonstrate how a single circuit failure on a transport route or a single software error in a data center can spread quickly and cause big outages. I join a lot of the industry in blaming the spread of these outages on the concentration and centralization of networks where the nationwide routing of big networks is now controlled by only a handful of technicians in a few locations. In early October, we saw the granddaddy of all network outages... more

Why the Cloud Is the Solution for Telecom Upgrades

With so much "cloud-talk" across every industry -- many presume that every company with serious telecom operations has already moved there -- but they haven't. In fact, 20 to 25% of global companies are still using legacy PBX systems and MPLS networks and waiting to replace them and move over to SD-Wan/mesh solutions. These advancements can be done successfully after an infrastructure audit has been conducted to identify operational weaknesses and threat vulnerabilities and measuring efficiencies of each feature for usage optimization and increased productivity. more

SpaceX’s Rural Development Project in India

Sanjay Bhargava, Starlink Country Director for India at SpaceX (source)SpaceX Starlink is moving quickly in India. Last April, they said they would be offering service in 2022 and began accepting pre-orders. In July, SpaceX committed to manufacturing antenna systems and terminals in India and, at the end of September, Sanjay Bhargava, who had been with Elon Musk at Paypal, was selected to head Starlink in India. In the last week or two, they set up a wholly-owned subsidiary that will apply for licenses, seek Indian distribution partners, and attempt to sell 200,000 units - 80% in rural districts - in 2022. more

Predicting Future Broadband Prices

I've been giving a lot of thought lately to the long-term trajectory of broadband prices. This is something that should be considered by anybody who is thinking about competing in a market against a big cable company. It's not an easy question to get your hands around since many factors might affect future rates. The following are some of the major trends that I think must be considered. First is pressure on the big ISPs from Wall Street. more

Content Blocking at the DNS Level in Germany

For those who follow the issue of blocking illegal content from the Internet, there is an interesting development in relation to this issue here in Germany, and I will tell you a little about it. One way to make it difficult to access illegal content is to block it directly in the DNS. But what is DNS for? Basically, it serves to translate the domain name into the IP of the server that is hosting the content. By blocking directly at the DNS level, a query to a domain will no longer bring the server's IP number, and with that, the user no longer accesses that content. more

Searching for the Meaning of “Registers” in the Anticybersquatting Consumer Protection Act (ACPA)

Where outcomes depend on a word’s meaning, the first task is to define it. “Registers” which is one of the keywords in the Anticybersquatting Consumer Protection Act (ACPA), is still in the process of definition. Its statutory context provides that a domain name registrant is liable to the owner of a mark if “it has a bad faith intent to profit from that mark … and (ii) registers, traffics in, or uses a domain name [corresponding to a mark] that … is distinctive at the time of registration of the domain name [and] is identical or confusingly similar to that mark. more

Registrar Influence on the Domain Security Posture of the Forbes Global 2000

In the 2021 Domain Security Report, we analyzed the trend of domain security adoption with respect to the type of domain registrar used, and found that 57% of Global 2000 organizations use consumer-grade registrars with limited protection against domain and DNS hijacking, distributed denial of service (DDoS), man-in-the-middle attacks (MitM), or DNS cache poisoning. On average, the adoption of domain security controls is two times higher for enterprise-class registrars than for those using consumer-grade registrars. more

A Three-Step Process to Chase Compulsive Domain Brand Squatters

Domain brand squatting can be defined as the unauthorized or dishonest use of a brand or company identifiers in domain names. It is often linked to the use of look-alike domains in bad faith, and we see it all the time. The threat actors behind these domains are called different names, though a prevalent one would be “typosquatters.” The Hot on the Trail of Compulsive Brand Squatters webinar showcased how these people are infiltrating the Internet. The first page of PhishTank’s valid phish search alone as of this writing tells us that domain brand squatting is a real and present danger. more