/ Most Commented

ISOC: Global Internet Community Must Unite to Support Open Internet Access, Freedom, and Privacy

The Internet Society Board of Trustees during its meeting in Berlin, Germany today called on the global Internet community to stand together in support of open Internet access, freedom, and privacy. Recently exposed information about government Internet surveillance programs is a wake-up call for Internet users everywhere -- the fundamental ideals of the Internet are under threat. The Internet Society Board of Trustees believes that government Internet surveillance programs create unacceptable risks for the future of a global, interoperable, and open Internet. more

How Safe is FttH?

My blog 'What PRISM, credit card hacking and Chromecast have to do with FttH' led to some very interesting discussions all around the world. One of issues that was discussed was that the sheer capacity of FttH will also allow hackers, criminals and others to use that massive capacity for the wrong reasons. Its volume will make it increasingly difficult to police. more

Internet Society Launches Questionnaire on Multistakeholder Participation in Internet Governance

The Internet Society today announced the launch of a survey to gain greater insights into multistakeholder governance perceptions and processes at all levels - national, regional, and international. The questionnaire is open to all interested participants and is available until 30 September 2013. The survey is one component of the Internet Society's broader initiative focused on the open and sustainable Internet. more

The World of Internet Threats Is Constantly Changing

The world of Internet threats has changed continually over the years. From the time that a "worm" first showed up in the wild, or whenever someone penetrated a system without authorization for the first time, various forms of attacks and malware have presented dangers to the system and those who use it. Different vectors have received varied focus over the years... Many parts of the Internet community have been involved in addressing relevant issues and fostering efforts to combat them. more

Polish CERT Polska and NASK Pull the Plug On .pl TLD On Malicious Registrar, Domain Silver

Today we publish an overview of domains registered through Domain Silver, Inc, a registrar operating in the .pl domain. This Registrar started operating in May 2012. Since that time, the CERT Polska team started to observe a large increase in the amount of malicious domains registered in .pl and to receive many complaints concerning domains registered through Domain Silver. more

NXDOMAINS, SSAC’s SAC045, and New gTLDs (Part 4 of 5)

In 2010, ICANN's Security and Stability Advisory Committee (SSAC) published SAC045 [PDF], a report calling attention to particular problems that may arise should a new gTLD applicant use a string that has been seen with measureable (and meaningful) frequency in queries for resolution by the root system. The queries to which they referred involved invalid Top-Level Domain (TLD) queries (i.e., non-delegated strings) at the root level of DNS, queries which elicit responses commonly referred to as Name Error, or NXDomain, responses from root name servers. more

Making Sense of MIIT’s Category of Telecommunications Services

This morning I read a catchy titled article on CircleID "China Closing the Door to New Technologies". I was trying to make sense of what all the fuss is about... So I called up my friends in Ministry of Industry and Information (MIIT) for lunch to find out what's going. more

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 2

In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve. more

China Closing the Door to New Technologies

2013 may be a promising year for global trade in technology with the kick-off of the International Technology Agreement expansion discussions, the Trans-Atlantic Trade and Investment Partnership, and as the Trade in Services Agreement gets going. But China calls its own tune, and is now threatening to restrict its market for Internet-enabled technologies through a clever device that could cost its trading partners billions. more

On the Question of Closed Generic Top-Level Domains

The debate over so-called "closed generic" top-level domains has revealed that rarest of semi-mythical beasts, a creature often emblazoned in ICANN heraldry but as elusive as the unicorn on the UK royal coat of arms: an argument on principle. Occasionally an issue arises out of the muck of self-interested manoeuvring to reveal the deep idealism that moves most ICANN participants. You can see it by how it divides camps that usually march along in lock-step, and by how the predictable murmur of shopworn cliches is replaced by arguments of clarity and resonance. more

The NameSentry Report: Benchmarking Abuse Levels in the Domain Name Industry

On July 10th Architelos released the first NameSentry Report, benchmarking abuse levels in the domain name industry. For some time now, a debate has raged about the potential impact of new gTLDs on Internet safety and security, namely abusive registrations such as phishing, spam, malware, and so on. However, without benchmarking the current state, how can we realistically evaluate if new gTLDs have made any measureable difference in the level of abuse? more

Paths of Glory: Privacy Still Matters

The world has changed dramatically for the better over the last 15 years, mainly due to the commercialization of the Internet. That is what I would like to believe. Unfortunately, I am no longer sure. True, the Internet connects all of us with every corner of the world... For the rest, the times may be changing, because there are those who believe that the Internet should be molded to fit those same old bureaucracies and corrupted institutions that have plagued humanity for decades, if not centuries. The solution, many times, feels far out of reach. more

Can We Create a Secure Caller ID For VoIP?

Can we create a "secure Caller ID" for IP-based communications, a.k.a. voice-over-IP (VoIP)? And specifically for VoIP based on the Session Initiation Protocol (SIP)? Can we create a way to securely identify the origin of a call that can be used to combat robocalling, phishing and telephony denial-of-service (TDOS) attacks? That is the challenge to be undertaken by the "Secure Telephone Identity Revisited (STIR)" group meeting tomorrow morning, July 30, 2013, at 9:00 am in Berlin, Germany, as part of the 87th meeting of the Internet Engineering Task Force (IETF). more

Why the Opus Codec Matters - Even if You Don’t Care About Audio

What makes the Opus codec so interesting? Why is there such a buzz about Opus right now? If you are not in telecom or doing anything with audio, why should you even remotely care about Opus? In a word... Innovation! And because Opus has the potential to let us communicate with each other across the Internet with a richer and more natural sound. You will be able to hear people or music or presenters with much more clarity and more like you are right there with them. more

What’s Happening With Aug. 13 Applicant Auction to Resolve gTLD Contention?

The second Applicant Auction is coming up on August 13, and after a great round of workshops at the ICANN Conference in Durban, we've started to finalize all of the details. Any applicants who haven't indicated their intention to participate can still do so! more