/ Most Viewed

As IPv6 Deploys, Will We Look Back on NAT as the Ugly Step Sister or Unsung Hero?

The debates are raging over whether or not we should migrate to IPv6. The strongest argument is the enormous address space that will allow for everyone and everything to have a unique public address, many addresses actually. It is often said that the shortage of public IPv4 addresses has limited our capabilities because it led to the pervasive use of private addressing, Network Address Translation (NAT) and Port Address Translation (PAT). Though these technologies remain critical, they are often regarded as stop-gap measures, and they sometimes create problems. In some circles, NAT has acquired a very bad name. But is that a fair perspective of the technology? Let's review the positives and negatives. more

Typosquatting Continues to Pose Dangers to Enterprises, Consumers

While typosquatting is not a new phenomenon, recent research highlights that it is being used to collect sensitive corporate information from employees and lure consumers to interact with dubious websites. ... Security consultancy Godai Group recently uncovered the use of a specific type of typosquat - a "doppelganger domain" - to collect sensitive enterprise information via email-based attacks. more

Banning 5G Equipment is a Foolish Strategy

It has become popular today around Washington and the venues of its coerced allies to issue threats to ban telecommunications equipment from certain countries - especially equipment intended for 5G use. The guise is vague assertions of "national security." It is an old tactic dating back to the turn of the last century and recurrent for decades. A combination of treaty instruments and collaborative industry standards activity several decades ago largely put an end to the banning tactic - significantly benefitting the entire world. more

Can We Create a Secure Caller ID For VoIP?

Can we create a "secure Caller ID" for IP-based communications, a.k.a. voice-over-IP (VoIP)? And specifically for VoIP based on the Session Initiation Protocol (SIP)? Can we create a way to securely identify the origin of a call that can be used to combat robocalling, phishing and telephony denial-of-service (TDOS) attacks? That is the challenge to be undertaken by the "Secure Telephone Identity Revisited (STIR)" group meeting tomorrow morning, July 30, 2013, at 9:00 am in Berlin, Germany, as part of the 87th meeting of the Internet Engineering Task Force (IETF). more

Actions Required by Developing Economies Against Spam

My OECD paper on spam problems in developing economies is now linked from the OECD Anti-Spam Toolkit page, as part of section 8 of the Anti-Spam Toolkit (Outreach). This ZDNet article provides a reasonably good summary of my paper as well. I welcome comments and suggestions from CircleID readers. "Spam is a much more serious issue in developing countries as it is a heavy drain on resources that are scarcer and costlier in developing countries than elsewhere..." more

Gmail Now Supports Internationalized Domain Names

If your first language isn't English and you don't use the Latin character set you can and will run into barriers. While Internationalized Domain Names (IDNs) i.e. domain names where either the left of the dot, the right of the dot or the entire string is in characters other than Latin ones, do exist and have existed for a number of years not all services work well with them. more

The Continuing ITU Meltdown

It is rather like watching the episodes in the new season of a soap opera. When we last left the ITU at its WCIT treaty conference in Dubai in December, fifty-five nations got up and left, refusing to sign a profoundly broken scheme to regulate anything and everything related to telecommunications, information systems, and the Internet. Eighty-nine nations signed - notably Russia, China, Korea, and most of the Middle East and African countries. This G55 versus G89 split fundamentally fractured the legal basis of the ITU and the role of its standards making body. more

A Look at How Google, Verizon and the FCC Talks are Playing Out

Sam Gustin reporting in DailyFanance: "As Apple (AAPL), Amazon (AMZN), Netflix (NFLX) and Google forge ahead with highly publicized new plans to stream high-speed content like movies and TV shows to your living room, smartphone, telecom and cable giants like AT&T, Verizon and Comcast (CMSCA) have been intensely lobbying to maintain control over the broadband pipes they spent billions to build. Comcast is going so far as to buy a rich content factory, NBC Universal, a deal that would create a $35 billion media and delivery juggernaut." more

Finding Good ICANN Board Candidates

In the late summer of 2006, the ICANN Nominating Committee will convene to select three members to the ICANN Board of Directors, and four members to various councils. Depending on the global visibility of the nominees, and the current political and technical currents pulling at the Internet community, these nominations will be both pilloried and lauded in different circles. This process of selecting a good ICANN board member is astonishingly complex; I should know, having served on the founding NomCom in 2003, and the succeeding NomComs in 2004 and 2005. By far the biggest challenge is finding good candidates... more

Berlin the Latest New TLD Battleground?

If you've been following the new Top-Level Domain (TLD) process within ICANN over the last year or so you will have probably been aware of how slow and tortuous development has been. To recap, ICANN, which oversees domain names globally, announced that it was "opening up" the internet so that "anyone" could get the domain extension they wanted. Of course it's not really "everyone" and the process to date has been far from smooth. more

Do Agencies Already Have the Authority to Issue Critical Infrastructure Protection Regulations?

The President and Congress are deliberating how best to ensure appropriate cybersecurity protection for private sector critical infrastructure. Legislative action and Executive Order are both under consideration. It is possible, however, that the White House Office of Management and Budget (OMB) already has sufficient statutory authority to enact new cybersecurity regulations through the normal notice-and-comment rulemaking process. more

I Got Fired

It's a story told a thousand times: founder of a company ousted by investors. It's a story so common you can find it any day of the week as a minor headline in a tech blog. Not much of a story at all really, until it happened to me. Minds + Machines, the company I founded in 2009, informed me last week that I was no longer wanted as CEO. Without going into details, which I can't, there were differences and disagreements. Still, it was a surprise. All the plans, the hopes -- pfhhht! into thin air. It sucked. Now what? more

Typosquatted Domain Names Pose Plenty of Risk But Surprisingly Little Malware

A recent study took an in-depth look at the scale and the risk of domain name typosquatting -- the practice of registering mis-spellings of popular domain names in an attempt to profit from typing mistakes. "Applying every possible one-character typo to the domain names of Facebook, Google, Twitter, Microsoft, Apple and Sophos," Paul Ducklin, Sophos' Asia Pacific head of technology collected HTTP data and browser screenshots from 1502 web sites and 14,495 URLs. In this report, Ducklin analyses the data revealing unexpected results within the typosquatting ecosystem. more

The Single-Letter Domain Trademark Game

Patent practitioners are familiar with the long-honored practice of engaging in standards-setting activities with the aim of having the standard ultimately require the use of one's proprietary technology. This practice is no longer limited to patents, but has become the game the whole family can play. While most standards-setting organizations have caught on, and have implemented IP disclosure policies, ICANN has not done so... As some are aware, the question of making single-character domain names available has been a perennial topic of discussion within ICANN, championed by a few who have quietly been engaged in some interesting advocacy within the USPTO along a parallel track. more

New Book on Domain Name Regulation

My book, "The Current State of Domain Name Regulation: Domain Names as Second Class Citizens in a Mark-dominated World" is now available by Routledge. The following is an overview of the book. more