/ Most Viewed

We Have a Paradigm for Surveillance That’s Broken, Fit Only for the Analogue Past

As each day brings new revelations about surveillance online, we are starting to see increasing activity in national legislatures intended either to establish more control over what the security services can do to their nationals (in countries like the US), or to limit access by foreign secret services to the personal information of their citizens (countries like Brazil). Unfortunately, neither of these approaches address the underlying problem: we have a paradigm for surveillance that's fit for the analogue past, not the digital present, let alone the future. more

Connectivity Starts at Home

Today's Internet is just one application of the powerful idea of best-efforts connectivity. The home router (NAT) decouples the connectivity within the home from the larger internet, enabling innovation that leverages the Internet without being limited by it. Connectivity starts at home. Your computers and devices all interconnect locally. In a sense, the larger Internet is just one more connected device. You are free to innovate and experiment without asking a provider's permission. more

Military Asserts Rights to Return Cyber Attacks

The Washington Post had a good article up yesterday capturing comments issued by the United States military that it has the right to return fire when it comes to cyber attacks... This is an interesting point of view, and it extends from the United States's policy that if it is attacked using conventional weapons, it reserves the right to counter respond in kind. This has been a long accept precept governing US foreign military policy for generations. Yet cyber attacks are different for a couple of reasons... more

What It Takes to Prove Common Law Rights in UDRP Complaints

The Uniform Domain Name Dispute Resolution Policy now has seventeen years of history. A high percentage of disputes are indefensible and generally undefended. As the history lengthens, early registrants of dictionary word-, common phrase-, and arbitrary letter-domain names have been increasing challenged in two circumstances, namely by businesses who claim to have used the unregistered terms before respondents registered them and later by emerging businesses with no history prior to the registrations of the domain names. more

Blame Yourself, Not ICANN

Domain name owners have traditionally complained that ICANN does not listen to us, and there is indeed plenty of evidence demonstrating the group’s obliviousness to community input. Nevertheless, as domain owners, we need to begin giving ourselves a share of blame too. It’s time to reflect on our failures so we can come up with an actionable solution... more

Government Officials, Academia, and Advocacy Groups Say Time for US to Get Its Own GDPR

US Congress asked to develop an internet data privacy legislation similar to the EU's General Data Protection Regulation (GDPR) to enhance consumer protections. more

Donuts Holder of the Largest Portfolio of New TLDs Acquired by Abry Partners

Donuts Inc., a global leader in new top-level domains (TLDs), has announced that it has entered into an agreement to be acquired by Abry Partners, a private equity firm. more

Reflections on the Pandemic Effect on Internet Use and Democracy

Last year, around the same time, the release on the same day of two flagship reports on 'the Internet' had prompted me to write an article on CircleID entitled 'Connecting the Next 46 Percent: Time to Pick the Good From the Bad and the Ugly'. I was then prudently asking whether 'the more we connect the world, the less free it becomes?'. Who would have known that a pandemic would erupt a few months later, unveiling different perspectives in assessing that very same question? more

Why You Shouldn’t Believe Network Speed Tests

The media is filled with hyperbolic claims that "Our network is the fastest!" And there are many so-called "Speed Test" tools available on the Internet. Most are easily run in a web browser. Should you trust those tools? Not really. The popular speed testing tools provide a very narrow and limited measure of network "speed." It is quite possible that a network that is rated as "fast" could actually deliver poor results to many applications. Why is this so? more

Conclusion: SLD Blocking Is Too Risky Without TLD Rollback (Part 4 of 4)

ICANN's second level domain (SLD) blocking proposal includes a provision that a party may demonstrate that an SLD not in the initial sample set could cause "severe harm," and that SLD can potentially be blocked for a certain period of time. The extent to which that provision would need to be exercised remains to be determined. However, given the concerns outlined in Part 2 and Part 3 of this series, it seems likely that there could be many additions (and deletions!) from the blocked list given the lack of correlation between the DITL data and actual at-risk queries. more

How Is Russia Connected to the Wider Internet?

Speculation about Russia disconnecting or being disconnected from the wider Internet abounds. In this article, we look at the connectivity of the Russian Internet to the wider Internet and how this evolved around the Russian invasion of Ukraine and the related sanctions. more

Trump’s Fundraising Email - Bad Data Drives Delivery Problems

It's a wild election season here in the US. In the past few presidential elections, email has played a bigger and bigger role in messaging and fundraising. President Obama's campaign used email effectively, but sent huge volumes. In fact, the volume was so heavy, it led to a joke on the Daily Show... This year there is a stark difference in how the candidates are using email. more

One-Click Unsubscription

Unsubscribing from mailing lists is hard. How many times have you seen a message "please remove me from this list," followed by two or three more pointing out that the instructions are in the footer of every message, followed by three or four more asking people to not send their replies to the whole list (all sent to the whole list, of course,) perhaps with a final message by the list manager saying she's dealt with it? more

Recommendations for Adding Cybersecurity Intelligence to the Smart Grid

Over the last few years, there has been an increased effort to modernize the U.S. electric grid. Building a "Smart Grid" has been central in the effort to help utilities better manage their resources, minimize power outages and reduce energy consumption. However, adding more electronic devices and sensors to the grid's network has made it a prime target of cyberattacks, like Distributed Denial of Service (DDoS) attacks, which if successful, could cause wide-spread disruption of services affecting many other sectors. more

Bringing Order to Chaos

If we were to apply themes to Internet governance world, the narrative for 2014-15 is definitely 'change'. The governance ecosystem is knee deep in the IANA transition, with a few meetings and teleconferences of the IANA Transition Coordinating Group behind us, and a ramping up of activity around ICANN accountability and governance. While the IANA transition and ICANN accountability processes are being conducted in parallel and independently, it's important to note that not only are they related, they are dependent on one another. more