/ Most Commented

Neustar Analysis Shows ICANN Study Overstates Risk of Harmful Domain-Name Collision

As we blogged about recently, Neustar is committed to ensuring that the domain name system is secure and stable and has been operating top-level domains (TLDs) for over a decade. Tuesday, Neustar submitted comments to the Internet Corporation for Assigned Names and Numbers (ICANN) in response to ICANN's proposal to delay the launch of hundreds of new generic top-level domains (gTLDs). ICANN's decision to delay the launch is based on a study it commissioned that measured the potential frequency of domain-name collision. more

Telecoms a Double-Edged Sword for the Industry

The telecommunications business is a double-edged sword. On the one hand it is an enormous growth industry because of its function as a key facilitator in the transformation of societies and economies towards a future that is driven more and more by ICT developments. Over the last decade companies such as Google, Apple, Samsung, Amazon and Facebook have made it to the list of the most successful businesses... On the other hand many of the traditional telco businesses operating in this market are recording declining results. more

How Not to Stop Spammers

Spam Arrest is a company that sells an anti-spam service. They attempted to sue some spammers and, as has been widely reported, lost badly. This case emphasizes three points that litigious antispammers seem not to grasp: Under CAN SPAM, a lot of spam is legal; Judges hate plaintiffs who try to be too clever, and hate sloppy preparation even more; Never, ever, file a spam suit in Seattle. more

Letter to ICANN Looks at .CBA and the New gTLD Collision Risk Mitigation Proposal

Verisign today has posted a letter as a public comment concerning ICANN's New gTLD Name Collision Risk Mitigation proposal. The letter, signed by Danny McPherson, Pat Kane (SVP Naming and Directory Services) and Tom Indelicarto (VP and Associate General Counsel), shares Verisign's analysis focused on identifying some of the systematic risks that will be exposed by the new gTLD program and who the impacted parties are likely to be. The letter takes into account details about a focused technical analysis of the .CBA applied-for string. more

On the Time Value of Security Features in DNS

There are some real problems in DNS, related to the general absence of Source Address Validation (SAV) on many networks connected to the Internet. The core of the Internet is aware of destinations but blind to sources. If an attacker on ISP A wants to forge the source IP address of someone at University B when transmitting a packet toward Company C, that packet is likely be delivered complete and intact, including its forged IP source address. Many otherwise sensible people spend a lot of time and airline miles trying to improve this situation... The problems created for the Domain Name System (DNS) by the general lack of SAV are simply hellish. more

Travelogue Broadband Experiences

Throughout this year I have once again travelled extensively through USA, Europe, Asia and Latin America. Naturally, being in this industry I watch closely the various developments in broadband, mobile and WiFi. When you are travelling obtaining access is never far from one's mind. This also provides good opportunities to compare what is available, where, what the quality is, and so on. Looking back over many years there is no doubt that, no matter where you travel, there has been incredible progress. more

Diagnosing Load Test Errors - Where to Start for Holiday Success

Picture this: you just completed hours of internal Web services preparations with your system administrative team prior to the holidays. You discovered possible points of failure and made appropriate modifications with the expectation of a perfect load test. You take a few minutes to relax, refill the coffee mug sitting in front of you, and connect to the conference bridge where real-time discussion about the load test will occur. Things go well for the first 20 minutes of the test... Then it happens: one of the simulated users logs an error stating that it has timed out. more

Verizon and the FCC Clash Over Net Neutrality Laws

Edward Wyatt reporting in the New York Times: "In a momentous battle over whether the Web should remain free and open, members of a federal appeals court expressed doubt over a government requirement that Internet service providers treat all traffic equally. On Monday, the Federal Communications Commission and Verizon, one of the largest Internet service providers, squared off in a two-hour session of oral arguments -- three times as long as was scheduled." more

IETF Chair’s Statement On Security, Privacy And Widespread Internet Monitoring

This weekend Jari Arkko, Chair of the Internet Engineering Task Force (IETF), and Stephen Farrell, IETF Security Area Director, published a joint statement on the IETF blog titled: "Security and Pervasive Monitoring"... They go on to outline some of the IETF's general principles around security and privacy as well as some of the new developments. They also point out a vigorous (and still ongoing) discussion within the IETF around how to improve the security of the Internet in light of recent disclosures. more

More Petition by Google for Greater Transparency

Google reported today that it has filed an amended petition in the U.S. Foreign Intelligence Surveillance Court. The company, in a blog post, reports: "This petition [PDF] mirrors the requests made to Congress and the President by our industry and civil liberties groups in a letter [PDF] earlier this year. Namely, that Google be allowed to publish detailed statistics about the types (if any) of national security requests we receive under the Foreign Intelligence Surveillance Act, including Section 702." Request has also been made by Google for the court to hold its hearing in open rather than behind closed doors. more

New gTLDs: The Registry Lock

Last week, The New York Times website domain was hacked by "the Syrian Electronic Army". Other famous websites faced the same attack in 2012 by the Hacker group "UGNazi" and, in 2011 by Turkish hackers. Basically, it seems that no Registrar on the Internet is safe from attack, but the launching of new gTLDs can offer new ways to mitigate these attacks. more

NASA Launching a Moon Satellite to Test 600 Mbps Laser Broadband

David Talbot reporting in MIT Technology Review: "A new communications technology slated for launch by NASA this Friday will provide a record-smashing 600 megabits-per-second downloads. The resulting probe will orbit the moon and send communications back to Earth via lasers. The plan hints at how lasers could give a boost to terrestrial Internet coverage, too. Within a few years, commercial Internet satellite services are expected to use optical connections -- instead of today's radio links -- providing far greater bandwidth." more

In Broadband, China Is Definitely the Middle Kingdom - 270M In 2015

With a goal of 270M fixed broadband lines in 2015 and near-universal service by 2020, the new "Broadband China" strategy is extraordinary. OFweek, a valuable site in Chinese, breaks the plan into three phases. The first is a full speed stage, ending in 2013, that deploys basic broadband and 3G widely. The second stage, 2014-2015, is dedicated to a further takeup and wider deployment. That will include 400,000+ LTE cell sites. more

OIAC Report: Views on Economic Impacts of Open Internet, Mobile Ecosystems, Specialized Services

Having been a member of the Committee for this past year, I'm pleased to share that the US Federal Communications Commission (FCC) "Open Internet Advisory Committee" has published its first annual report... The report is weighty - 98pp if you kill trees to print it. The OIAC was established as part of the US FCC Open Internet activity and Open Internet Report and Order from 2010. The FCC appointed expert committee members from a broad range of commercial, academic, and not-for-profit organizations. more

Examples of Where ICANN Can Be More Accountable

During the "GNSO Discussion with the CEO" at the recent ICANN meeting in Durban, I stated that ICANN talks a lot about the importance of supporting the public interest, but in reality the organization's first priority is protecting itself and therefore it avoids accountability and works very hard at transferring risks to others. In response to my comments, ICANN CEO Fadi ChehadĂ© asked me to provide him examples of where ICANN can be more accountable. Copied below is my response letter to ChehadĂ©, which provides seven examples. more