/ Most Commented

China Mobile Is Reporting 15M 5G Contracts, 8.7M Joined in February

5G is growing by millions per month in China, although the exact status is unclear. The telcos are reporting "contracts," which continue to be far higher than the separately reported 5G phone sales. more

The Secure 5G and Beyond Act – U.S. Credibility and Legal Requirements at Stake

The Secure 5G and Beyond Act of 2020 has been submitted by the U.S. Congress to the White House for signing into law. It has been sitting there for several days now, but there are obviously more important developments demanding attention than a law compelling the Executive Branch to develop a 5G security strategy within 180 days through public and Federal agency consultations that will be implemented by the NTIA. more

Public Interest Registry, ICANN Agree to Extend Deadline on Review of Proposed Acquisition of .ORG

The Internet Corporation for Assigned Names and Numbers (ICANN) and Public Interest Registry (PIR) today announced that they have mutually agreed to extend ICANN's time to review PIR's submissions to April 20th. more

U.S. Health Agency Suffers From Cyberattack, COVID-19 Disruptions by Foreign Actors Suspected

The U.S. Health and Human Services Department (HHS) is reported to have suffered from cyberattacks on its computer system believed, by those familiar with the incident, to be a disruption and disinformation campaign aimed at undermining the response to the coronavirus pandemic. more

Broadband Companies Take Connectivity Pledge Amid COVID-19 Crisis

Broadband and telephone service providers of all sizes in the US have signed on to a "Keep Americans Connected Pledge" aimed at maintaining connectivity for citizens amid disruptions caused by the coronavirus pandemic. more

The Life Cycle of Digital Certificates Reduces Again

Recently, there were news articles about a large software provider who experienced a global outage due to an expired digital certificate - and this is not the first time this kind of issue has hit the news. Digital certificate outages, when an organization forgets to replace an expiring certificate for a business-critical domain name, continues to cause business disruption and security risks. more

Apple Satellites?

Word has leaked out that Apple is working on a satellite project. The company is at the beginning of the research project, so there is no way to know exactly what they have in mind. For example, is the company considering launching satellites, or would they lease capacity from one of the other planned satellite networks? The fact that Apple is working on the concept is a good segue to discuss the many ways that satellite connectivity could be useful to Apple or other companies. more

Will 5G Implementation Lead to an Increase in Ransomware Attacks?

5G has arrived and is poised to supercharge our lives with ultra-fast download speeds and better than ever connectivity. It may not be ready to replace WiFi just yet, but AT&T has already deployed 5G networks in various cities across the US. 5G tech was the hottest commodity at CES 2019. According to some estimates, 5G will bring $12 trillion into the global economy by 2035, connecting everything from our toasters to our pet's collars and a range of other IoT devices. more

Most Employees in Rural America Can’t Work From Home Due to Lack of Required Broadband Speeds

One of the hottest topics in the news related to coronavirus is working from home. Companies of all sizes are telling employees to work from home as a way to help curb the spread of the virus. Companies without work-at-home policies are scrambling to define how to make this work to minimize disruption to their business. Allowing employees to work at home is not a new phenomenon. more

Highlights from ICANN67 Public Forum – Community Dialogue on Proposed Transfer of PIR Ownership

Ethos CEO Erik Brooks and I are grateful to ICANN for hosting this important community dialogue on the future of PIR and .ORG earlier this week, and we listened intently to the questions posed. To echo what John Jeffrey said in his opening remarks, we are very interested in the community's input. We appreciate the openness and candor that was expressed during the Public Forum, and we would like to take this opportunity to recap a few of the overarching themes and questions asked. more

Political Email Placement or, You’re Not Special

A recent piece in The Markup called Swinging the Vote? attempts to figure out how Google decides where to deliver political e-mail. They were startled to discover that only a small fraction of it was delivered into the main inbox, and a fair amount was classed as spam. They shouldn't have been. This is an example of the fallacy We're so nice that the rules don't apply to us, which is far too common among non-profit and political mailers. more

Cyberspace Solarium Commission Report

The Cyberspace Solarium Report released today is another, in an endless string of reports, that disgorge from Washington committees dealing with the eternal mantra of "defending American interests and values in cyberspace." The challenges (and many reports) here trace back 170 years when transnational telecommunication internets emerged. The dialogue and reports scaled in the 1920s with the emergence of radio internets and cyber threats, then again in the early 1980s... more

NGO Community Urges ICANN to Exercise Independent Judgment as It Reviews the .ORG Sale

ICANN is reviewing the Internet Society's proposed sale of Public Interest Registry, the .ORG registry operator, to private equity firm Ethos Capital. ICANN effectively has the power to stop the sale by terminating PIR's Registry Agreement. The Electronic Frontier Foundation, NTEN, Consumer Reports, Americans for Financial Reform and several other organizations joined Monday's Public Forum at ICANN67 to ask questions about how ICANN plans to review the change of control of the .ORG registry... more

When Proxy Services Enable Abuse

People are growing increasingly alarmed by recent examples of bad actors abusing proxy services offered by registrars. While proxy services are designed to protect the privacy of legitimate domain name users - they do the opposite when abused by cybercriminals. Responsible Proxy providers play a key role in mitigating abuse. When they don't act responsibly - it's clear they contribute to the problem. more

Website Security: Are Quantum Computers Going to Hack My Website?

No. Now, thank you for your attention. Last year, some security researchers were discussing a doomsday scenario, that without investing in quantum encryption, there would soon be no way to feel secure over the Internet. (I would add, that a feeling of security over the Internet is misleading at best.) Allow me to break down some of these security peculiarities, which could be worrisome. more