EU lawmakers are pushing for additional negotiations to strengthen a proposed data transfer agreement between the European Union (EU) and the United States. They argue that the current agreement still has shortcomings that must be addressed. The potential delay in reaching an accord is concerning for the thousands of companies that rely on the agreement. more
Artificial intelligence has important uses in the domain name industry. With the use of AI, domain name registration, management, and valuation have been made more efficient and accurate. Here are some specific ways AI is affecting domain names... AI-powered domain name generators can suggest relevant and available domain names based on specific keywords, making the search process easier and faster. more
The pace of generative AI development has been astonishing to the degree that the normative space has been unable to keep up. As governments start looking into some implementations of the technology, such as ChatGPT, more advanced techniques and products continue to emerge by the day. Society is changing in irrevocable ways, and it is paramount that the Internet Governance community turns its attention to this question. more
The United States Department of Justice has announced that it has neutralized a global network of computers compromised by malware called "Snake," which the U.S. government attributes to a unit within Center 16 of the Federal Security Service of the Russian Federation (FSB). more
The Decentralized Social Networking Protocol (DSNP) is a product developed by Project Liberty, an international non-profit founded by Frank McCourt, with the goal of transforming how the Internet works, who owns and controls personal data, and who benefits from the digital economy. The McCourt Institute, as the research and digital governance arm of Project Liberty, aims to support the development and management of DSNP. more
How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more
Large Language Models (LLM) like GPT -- 4 and its front-end ChatGPT work by ingesting gigantic amounts of text from the Internet to train the model and then responding to prompts with text generated from those models. Depending on who you ask, this is either one step (or maybe no steps) from Artificial General Intelligence, or as Ted Chiang wrote in the New Yorker, ChatGPT Is a Blurry JPEG of the Web. more
I recently attended a workshop on Lessons Learned from 40 Years of the Internet, and the topic of the Internet as a Public Utility in the context of national regulatory frameworks came up. For me, 40 years is just enough time to try and phrase an answer to the big policy question: Has the Internet been a success in the experiment of using market forces to act as an efficient distributor of a public good? Or has it raised more issues than it has addressed? more
The Australian Signals Directorate (ASD) has issued a new set of guidelines warning about the security risks posed by the use of 5G technology in so-called Smart Cities. The ASD's concerns align with those of the Five Eyes security alliance, which has warned that the interconnected nature of a fully connected city makes it vulnerable to cyberattacks. more
Verisign, a global provider of domain name registry services and internet infrastructure, released a statement today regarding the ICANN Board of Directors' decision on the .web auction. more
Thirty years ago, on April 30, 1993, a groundbreaking announcement was made by CERN that would irrevocably transform our world. Walter Hoogland and Helmut Weber, who held the positions of Director of Research and Director of Administration at CERN, respectively, released to the public a revolutionary tool initially proposed by Tim Berners-Lee in 1989. more
The European domain market is grappling with the combined pressures of inflation, energy prices, and EU regulations, which are impacting registry financials and operations. more
Anybody that uses more than one brand of Internet of Things (IoT) device in the home understands that there is no standard way to connect to these devices. Each manufacturer chooses from a range of different protocols to communicate with and control its devices, such as BLE, LoRa, LTE-M, NB-IoT, SigFox, ZigBee, and others. more
CENTR, the association which represents European country code top-level domain name registries (ccTLDs), such as .de for Germany or .no for Norway, has provided feedback to the United Nations' initiative on a Global Digital Compact (GDC). The GDC seeks to "outline shared principles for an open, free and secure digital future for all", and invites multistakeholder participation in the consultation phase. more
Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. more