/ Most Viewed

The Internet And Its Governance: Where Should We Look For Models?

The US Department of Commerce (DOC) has recently signed a new contract with the Internet Corporation for Assigned Names and Numbers (ICANN) for one more year. ICANN and the DOC are to continue to work together to design an organizational form that is suitable to administer and control the infrastructure of the Internet. That infrastructure includes the IP numbers, which are critical to the functioning of the Internet protocol TCP/IP. These numbers must be unique for the Internet to continue to function. The infrastructure also includes the protocols that make the Internet possible. Protocols involve the conventions or agreements that each network that is part of the Internet accepts in order to make communication possible across the boundaries of the different technical and political and administrative entities that comprise the networks of the Internet. Another component of the Internet's infrastructure is the domain name system (DNS). This system includes the names that identify various sites on the Internet and the translation of those names into IP numbers via the system of computers that make the one to one mapping between names and numbers. more

First RIPE NCC “Seizure of IPv4 Addresses” – Is This the Beginning of IPv4 as Collateral?

In a publication released on October 2, 2020, RIPE NCC reported its first seizure of IPv4 registration rights pursuant to a Dutch court order. Pursuant to the order, RIPE NCC effectuated a transfer of the IP Addresses from the liquidating debtor to its creditor. Although these IP Addresses could not be owned, they were apparently not legacy. Thus, they conferred no "property rights" - the registration rights were deemed an enforceable right that has value and were to be utilized towards satisfaction of a judgment. more

More Than 500 Schools in the U.S. Hit by Ransomware in 2019, Says Report

A recent report published by the cybersecurity firm Armor says ransomware infections have hit over 500 US schools in 2019 to date. Armor warns the rate of attack seems to be picking up with 15 new ransomware victims in the last two weeks, all of them educational institutions. more

ICM Announces General Availability of .XXX Domain Names

ICM Registry, the official registry of the new adult top-level domain (TLD) launched today for General Availability of .XXX domain names on a first come, first served basis. While the debate over the new domain has been fierce, the company reports today: "The introduction of .XXX has quickly become the most successful launch of any new sponsored top level domain. The positive public response has fueled global media interest normally not afforded to a new domain launch. In addition, the global advertising campaign, a first for any adult-related company, includes hundreds of nationally broadcast TV commercials, radio, newspapers and online ads. The www.buy.xxx website is already receiving nearly one million visitors per day." more

Another Day in Court for CFIT vs. VeriSign and ICANN

The CFIT vs. VeriSign et. al. lawsuit had another day in court today. ...The key point coming out of a hearing today (Friday, June 09, 2006) in front of U.S. District Court Judge Ronald Whyte in San Jose, California is that the arguments made by CFIT against the .com deal between ICANN and VeriSign will continue. ...There was one moment of some drama. After lawyers for VeriSign and ICANN both argued that the 7 percent price increases without the need for justification would not be a violation of anti-trust law, Judge Whyte asked the lawyer for ICANN if it would be an anti-trust violation if VeriSign had been granted an annual 100 percent increase. The lawyer said, "no." Other lawyers for other matters sitting in the audience seemed to shift uneasily... more

Other Countries Beginning to Adopt China’s Unique Approach to an Isolated Internet Structure

While in most developed nations, foreign telecoms are interconnected with local and other international Internet exchanges, in China, there are no foreign carriers detected within china's borders. more

Susan Crawford to the White House on Ada Lovelace Day

Just in time for Ada Lovelace Day comes the news that Susan Crawford (Wikipedia, CircleID) is headed to the White House as special assistant to the president for science, technology, and innovation policy... more

Ten Telecom Tsunamis

The telecom industry five years from now will be unrecognizable. The creative destruction of the Internet broadly writ will be even greater than it has been in the last decade. The major telcos, the major television networks, and the major cablecos -- if they still exist at all -- will have very different revenue models than they have today. That's the good scenario... more

Flame On!

Here we go again; another instance of really sophisticated spyware has been reported, a system that is "so complex and sophisticated that it's probably an advanced cyber-weapon unleashed by a wealthy country to wage a protracted espionage campaign on Iran". I won't get into the debate about whether or not it's really more impressive than Stuxnet, whether or not it's groundbreaking, or whether or not Israel launched it; let it suffice to say that there are dissenting views. I'm more interested in the implications. more

EFF and 26 Other Organizations Send Letter to Internet Society Urging It to Stop Sale of .ORG

EFF and 26 other organizations, including Wikimedia Foundation, Public Knowledge, National Council of Nonprofits, YWCA and YMCA, sent a letter today to the Internet Society (ISOC), urging it to stop the sale of the Public Interest Registry (PIR) -- operator of .ORG top-level domain -- to private equity firm Ethos Capital. more

What Stopped the Cuban Internet in 1996 and What Is Stopping It Today?

The problem today is bureaucracy and its companions - fear of competition, change and stepping out of line. Cuba connected to the Internet in 1996, but three factors stifled the Cuban Net: the US embargo, economic depression during what the Cubans call the "special period" after the disintegration of the Soviet Union and the Cuban government's fear of free information, which was also fed in part by the Soviet collapse. more

Picking Domain Names by Search Results

There is a definite advantage to knowing what users look for when typing in domain names that they think should work. This article from Government Computer News shows an excellent example in .gov. "600,000 visitors a year to FirstGov try to find the federal government's Web site by typing USA.gov into their browser", so they switched from firstgov.gov to usa.gov. It wasn't mentioned in the article, but firstgov.gov redirects automatically; this is more intelligence than I normally expect from US government web sites. more

The Path Toward Increasing the Security of DNSSEC with Elliptic Curve Cryptography

How do we make DNSSEC even more secure through the use of elliptic curve cryptography? What are the advantages of algorithms based on elliptic curves? And what steps need to happen to make this a reality? What challenges lie in the way? Over the past few months we've been discussing these questions within the community of people implementing DNSSEC, with an aim of increasing both the security and performance of DNSSEC. more

Even if Do-Not-Track Were a Good Idea, Could It Ever Work?

In a recent article, I read about increasingly intrusive tracking of online users, which has lead to a proposal at the FTC, "FTC Chairman Jon Leibowitz said the system would be similar to the Do-Not-Call registry that enables consumers to shield their phone numbers from telemarketers." Maybe I'm dense, but even if this weren't a fundamentally bad idea for policy reasons, I don't see how it could work. more

Content Blocking at the DNS Level in Germany

For those who follow the issue of blocking illegal content from the Internet, there is an interesting development in relation to this issue here in Germany, and I will tell you a little about it. One way to make it difficult to access illegal content is to block it directly in the DNS. But what is DNS for? Basically, it serves to translate the domain name into the IP of the server that is hosting the content. By blocking directly at the DNS level, a query to a domain will no longer bring the server's IP number, and with that, the user no longer accesses that content. more