In a press conference on Thursday at the University of Chicago, the U.S. Department of Energy (DOE) unveiled a report that lays out a blueprint strategy for the development of a national quantum internet. more
A substantial amount of DNS community discussion on the topic of DNS Abuse is focused on defining what is or is not DNS Abuse. The definition adopted by ICANN contracted parties, as well as the DNS Abuse Institute, is straightforward: DNS Abuse is malware, botnets, pharming, phishing, and spam where it's a vehicle for the preceding harms. There is, of course, some fuzziness on the margins, where technical harms are also using content. more
If you follow the Internet governance world like I do, you've no doubt had time to ponder the news of former ICANN Board Chair Peter Dengate Thrush's appointment as Executive Chairman of Top Level Domain Holdings Limited (TLDH). This was a seemingly fast jump from the body that coordinates the Internet (whose most recent milestone was to approve the creation of new gTLDs) to one of the key companies that stands to actively benefit from this burgeoning part of the domain name industry. Further, he's taken up a position that, according to reports, will allow him to benefit substantially as well. more
This is serious. I'm not joking. You can look it up. Morgan Stanley brought a UDRP action involving the domain name 'mymorganstaleyplatinum.com' against a registrant identified as "Meow ("Respondent"), Baroness Penelope Cat of Nash DCB, Ashbed Barn, Boraston Track, Tenbury Wells, Worcestershire WR15 8LQ, GB." The decision summarizes the response... more
This is an informal description the evolution of a particular area of network forensic activity, namely that of traceback. This activity typically involves using data recorded at one end of a network transaction, and using various logs and registration records to identify the other party to the transaction. Here we'll look at the impact that IPv4 address exhaustion and IPv6 transition has had on this activity, and also note, as we explore this space, the changing role of IP addresses within the IP protocol architecture. more
A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more
On 30 September 1850 at Dresden, the first international treaty was issued among the first sovereign nations to internet their national electronic communication networks. It was known as the Dresden Convention, and culminated several weeks hammering out basic requirements and techniques to implement an internet spanning the Austro-German European continent at the time, and established a continuing "Union" of signatories to evolve the provisions of the treaty. more
American Registry for Internet Numbers (ARIN) is running a trial service that gives users access to historical IP whois data – that is, it will tell you who was responsible for an IP address or block of IPs. The service is not automated and if you want to access it you will need to submit a request via email with information about not only what you want to know, but why you are interested in accessing the information. more
Using the lingo of Internet Governance, the "stakeholders" of digital technologies currently live in a state of confusion about their rights and responsibilities in the digital age. Digital technologies confront us with many questions we thought had been answered long before. We have a pretty clear understanding of our rights and responsibilities as citizens of our country, how a state should be governed, and how the private sector should conduct its business. more
British Telecom (BT) is hurting because the wireline phone business is inevitably declining. Their new hire is one of the world's most interesting thinkers on possible new businesses for telcos. Martin has been part of the Telco 2.0 group at STL Consultancy, the best small group of European analysts... more
In the end it was a disappointment that the treaty on International Telecommunications regulations (ITRs) that had been under negotiation for two weeks at WCIT-12 was not acceptable to 55 countries, and that, as a consequence, these countries did not sign the final version of the international treaty (89 did sign). After two weeks of sometimes fractious negotiation - 1,275 proposals were discussed in all - the contentious issues were significantly watered down. However the dissenting countries felt that the key issue - anything in relation to the internet - should not be included at all and, quite correctly, did not compromise on that. more
As chance has it, the attempt by NTIA to create a fake Trump Open 5G Security Framework MAGAverse as they headed out the door on 15 January is being followed this week by the global meeting of 3GPP SA3 (Security) to advance the industry's real open 5G security Framework. Designated TSGS3-102e (the 102nd meeting, occurring electronically), it continues the practice of assembling companies, organisations, and agencies from around the world every 8 to 12 weeks to focus on 5G security for current and future releases of 5G infrastructure. more
At the end of 2017, I posted a review of important LEO-satellite Internet service developments. I've been updating those posts during the year and have also added the following new posts in 2018. ... SpaceX, OneWeb and Telesat are planning to offer Internet-service from LEO, but O3b is already providing connectivity to relatively large customers like mobile phone companies, government organizations, and cruise ship lines using a constellation of medium-Earth orbit (MEO) satellites. more
The following is a selected summary of the recent NANOG 63 meeting, held in early February, with some personal views and opinions thrown in! ...One view of the IETF's positioning is that as a technology standardisation venue, the immediate circle of engagement in IETF activities is the producers of equipment and applications, and the common objective is interoperability. more
UK parliament has been the target of a "sustained and determined" cyberattack by hackers attempting to gain access to Member of Parliaments' and their staffers' email accounts. more