/ Most Viewed

Facebook Enters Wholesale Fiber Business, Plans to Sell Unused Capacity on New Fiber Routes

Facebooks says it intends to allow third parties - including local and regional providers - to purchase excess capacity on its fiber. more

Registry-Registrar Cross Ownership: Framing the Issues

There has been much said and written recently about the issue of registry-registrar cross ownership with regard to New Top Level Domains ("New TLDs"). It is clear that there appears to be a fair amount of confusion about the issue and the positions espoused by various parties. To assist the ICANN community in understanding the issue -- the points of agreement and debate -- I offer the following overview on behalf of Network Solutions and Central Registry Solutions... more

The G7 and EU Join China in Call for Space Debris and Collision Regulation

Last month, the Chinese government published space situational awareness and traffic management regulations and procedures designed to guard against collisions in orbit and mitigate space debris, and this month, at the G7 summit, delegates from Canada, France, Germany, Italy, Japan, the USA, the UK, and the EU pledged to take action to tackle the growing hazard of space debris as our planet's orbit becomes increasingly crowded. more

The Worm and the Wiretap

According to recent news reports, the administration wants new laws to require that all communications systems contain "back doors" in their cryptosystems, ways for law enforcement and intelligence agencies to be able to read messages even though they're encrypted. By chance, there have also been articles on the Stuxnet computer worm, a very sophisticated piece of malware that many people are attributing to an arm of some government. The latter story shows why cryptographic back doors, known generically as "key escrow", are a bad idea. more

IPv6: The Four Horsemen of the IPcalypse

War, famine, pestilence and death. They fought for the last IPv4 addresses, hoarded and sold them at outrageous prices, traffic and commerce came slowly to a halt... Pestilence invaded the internet... Bandits roam the lands. A retired general told recently that the internet looks like the North German plains, easy to invade. Cyberwar and Cybersecurity are becoming mainstream subjects and have increasing Government attention. more

The White House Broadband Plan

Reading the White House $100 billion broadband plan was a bit eerie because it felt like I could have written it. The plan espouses the same policies that I've been recommending. This plan is 180 degrees different than the Congress plan that would fund broadband using a giant federal, and a series of state reverse auctions. The plan starts by citing the 1936 Rural Electrification Act, which brought electricity to nearly every home and farm in America. more

No Virginia, You Have No Duty to Secure Your WiFi Access Point

Every now and again a report flies across the network about the police breaking down someone's door and attempting to arrest the home owner for bad things online - assuming that whatever happened from that person's Internet connection is their fault. Now there are lots of problems with this - lots of problems. But one of the big ones is that anyone can access an open access point... more

Institutionalizing Consumer Trust and Public Interest at ICANN

For an organization where people argue for hours over arcane minutiae, it's remarkable that virtually everyone agrees that ICANN should serve the "global public interest" and build "consumer trust" in the Internet. Although it's only three pages long, ICANN's Affirmation of Commitments (AoC) cites "public interest" five times and "consumer trust" eight times. So at the ICANN meeting today in Cartagena, Colombia, a group of participants explored ways to "institutionalize" these concepts within the organization. more

Mitigating the Increasing Risks of an Insecure Internet of Things

The emergence and proliferation of Internet of Things (IoT) devices on industrial, enterprise, and home networks brings with it unprecedented risk. The potential magnitude of this risk was made concrete in October 2016, when insecure Internet-connected cameras launched a distributed denial of service (DDoS) attack on Dyn, a provider of DNS service for many large online service providers (e.g., Twitter, Reddit). Although this incident caused large-scale disruption, it is noteworthy that the attack involved only a few hundred thousand endpoints... more

A New Boom to Come? Re-Evaluating the Success of the New TLD Program

I think it's fair to say that quite a few people -- both within the domain name industry and beyond -- have an opinion on whether the new TLD program is succeeding or struggling. But are things really all that bad? Are we forecasting doom before it has really had a chance to run? Crunching the numbers... Let's consider the (relatively short) history to this point and take a look at some statistics. more

About Those “Mission Critical” Bits

News that Google and Verizon are negotiating "better than best efforts" Internet routing probably comes across as a betrayal of sorts to network neutrality advocates. Bear in mind that Information Service Providers ("ISPs") do not file public contracts known as tariffs and have the freedom to negotiate deals with individual clients. On the other hand ISPs, regardless of their FCC regulatory classification, cannot engage in unfair trade practices that achieve anticompetitive goals such a tilting the competitive playing field in favor of a corporate affiliate, or special third party. more

EU Should Not Be Setting US WHOIS and Privacy Policy, Says MPAA

The Motion Picture Association of America (MPAA) in its recent submission to the National Telecommunications and Information Administration (NTIA) has raised a stern objection regarding ICANN's attempt to adhere to the EU's General Data Protection Regulation (GDPR), stating that the temporary specification had gone "well beyond what the GDPR mandates." more

ICANN’s Weak Accountability Remains a Problem

The JPA is dead, and in its place is the Affirmation of Commitments. Much debated, this change is anticipated to bring more global participation into ICANN's governance. Increased globalization may turn out to be beneficial for the Internet community, if it helps to shore up ICANN's institutional weaknesses. But the Affirmation leaves important questions unanswered... more

Registration Patterns of Deceptive Domains

A key requirement for a bad actor wanting to launch a brand attack is the registration of a carefully chosen domain name. The most convincing infringements frequently use a domain name that's deceptively similar to that of the official site of the target brand. This allows a variety of attacks to be executed, including phishing attacks... more

TeleGeography’s Interactive Submarine Cable Map Is a Fun and Fascinating View Into Infrastructure

Ever want to know where all the submarine cables are that provide part of the physical infrastructure of the Internet? Or which cities in the world have the most connectivity via submarine cables? (or which regions might be single points of failure?) In doing some research I stumbled across this excellent site from the folks at TeleGeography... It is a very well done and captivating (to me, anyway) view into where all the current and planned submarine cables are located. more