/ Most Commented

New LIRs and Their IPv6 RIPEness

The RIPE NCC's membership grew steadily over the course of 2012. In Q3, the RIPE NCC received 417 requests to become a Local Internet Registry (LIR); the highest number we have seen so far. This surge in membership growth exceeds the previous record set 12 years ago during the dotcom bubble in 2000. One reason for the surge is probably the anticipation of the last /8 of IPv4 addresses. more

Compliance Overhaul a Start

ICANN is clearly changing with the new CEO making immediate changes to the organizational structure and Compliance announcing a number more effective tools and procedures at Sunday's At-Large Advisory Committee (ALAC) and Regional Leadership Meetings. It seems very ambitious and they will need to be because our year-long research, publicly distributed here for the first time, shows a complete breakdown in ICANN's Compliance functions on every level possible. more

Emerging Cyber-Security Threats and Implications for the Private Sector

The new gTLD program will have a profound impact on the private sector's increasing dominance over Internet information resources and ownership of critical registry technical infrastructure assets. It is already anticipated that only the private sector will take full advantage of the commercial possibilities... However, the successful introduction of new gTLDs will also create new challenges of security for the private sector. more

A Simpler Approach to an Email Deliverability Metric

The term Email Deliverability is used to describe how well a mail flow can reach its intended recipients. This has become a cornerstone concept when discussing quality metrics in the email industry and as such, it is important to understand how to measure it. Email Deliverability is considered to be affected by a mythical metric, the reputation of the sender, which is a measure of that sender behavior over time -- and the reactions of the recipients to his messages. more

The Proposed “Cloud Computing Act of 2012,” and How Internet Regulation Can Go Awry

Sen. Amy Klobuchar has introduced a new bill, the "Cloud Computing Act of 2012" (S.3569), that purports to "improve the enforcement of criminal and civil law with respect to cloud computing." Given its introduction so close to the election, it's doubtful this bill will go anywhere. Still, it provides an excellent case study of how even well-meaning legislators can botch Internet regulation. more

A Perspective on Verisign’s Patent Application on Domain Name Transfers

As the battle rages over threats to the Internet architecture, a recent publication over the Patent Application for Domain Name Transfers by Verisign is disturbing for those who advocate an open and free Internet. The Application is based on an immediate and direct threat towards an open and free Internet. Just in case people are tempted to think that this was a prank given that they filed it on the 1 April 2011, searches at the United States Patents and Trademark Office (USPTO) reveals that this is a legitimate application . more

The Pros and Cons of BYOD (Bring Your Own Device)

At the Virus Bulletin conference this past September in Dallas, Righard Zwienenberg from ESET gave a presentation entitled BYOD. BYOD stands for Bring Your Own Device, but he reframed the acronym to "Bring Your Own Destruction", that is, he alluded to the security implications of bringing your own device. BYOD is the latest trend sweeping business and schools. more

The ‘Domain Rights Dozen’ - ICA’s RPM Revision Review Principles

As the fall of 2012 begins the implementation of rights protection mechanisms (RPMs) for new gTLDs is reaching a critical stage... Given the half year interval between the upcoming Toronto ICANN meeting and the following Beijing meeting in April 2013, it is highly desirable, and perhaps essential, that community discussion in Toronto result in a clear consensus on how RPM implementation should proceed if new gTLDs are to launch without further delay and if potential registrants are to perceive them as acceptable platforms for speech and commerce. more

The Internet and the Legitimacy of Governments

In two recent debate events I participated in, on iFreedom and privacy in the online world, mistrust of government and government's intentions and motivations on and towards the Internet were abundantly present with more than just a few people in the audiences. The emotions were not new to me, no, it was the rationality that surprised and sometimes almost shocked me. Why? Well, should these sentiments get the support of the majority of people, it would undermine all legitimacy of a government to govern. Let's try and take a closer look. more

Twitter’s t.co Domain Outage Caused by Human Error

Declan McCullagh reporting in CNET: "Twitter last year began to abbreviate all hyperlinks using its t.co domain name -- which had the side effect of introducing a central point of failure where none existed before. That failure happened last night [Sunday Oct 7] around 11:30 p.m. PT when t.co went offline, meaning millions of Twitter users received 'non-existent domain' errors when trying to follow links." more

Multi-Stakeholderism Revisited: ICANN, We, Can Do Better

ICANN, the private, non-profit, US-based organization is a key player in the global Internet governance ecosystem because it coordinates the Internet's unique identifiers and domain name system. In addition, ICANN develops policies that govern the DNS and addressing system of the Internet. For this reason, and the very model on which the organization's work is based, many countries take participation in ICANN very seriously... To hear ICANN tell it, their work is based on a "bottom-up, consensus-driven, multi-stakeholder model." more

A Copycat Canadian Privacy Suit Against Gmail

In July, several people filed attempted class action suits against Google, on the peculiar theory that Gmail was spying on its own users' mail. One of the suits was in Federal court, the other two in California state court, but the complaints were nearly identical so we assume that they're coordinated.Now we have a similar suit filed in provincial court in British Columbia, Canada. more

Trust - The Key to Cloud Computing Growth in Europe

The European Commission is optimistic about the future of cloud computing in the region and predicts it will not only save on data storage costs, but create new jobs and boost GDP. The European Union's cloud computing strategy was finally unveiled last week and is expected to boost GDP by around AUD$200 million (about 1 per cent) and create almost four million jobs in just under a decade. This is the first concerted effort by the EU to increase the popularity of cloud computing among businesses. more

Measuring the Cost of Cybercrime

Last week at Virus Bulletin in 2012, Tyler Moore of Southern Methodist University (SMU) gave a talk entitled "Measuring the cost of cyber crime." It was a study done in collaboration with multiple individuals in multiple countries. The study sought to answer this question - How much does cyber crime cost? Up until this point, nobody really knew. more

Cyberattackers Targeting Iranian Infrastructure and Communications Companies

Internet based attacks have targeted Iranian infrastructure and communications companies, disrupting Internet access across the country, according to today's reports. Country's secretary of the High Council of Cyberspace, has been quoted telling the Iranian Labour News Agency: "Yesterday we had a heavy attack against the country's infrastructure and communications companies which has forced us to limit the Internet. ... Presently we have constant cyber attacks in the country." more