/ Most Viewed

Ukraine’s Increasing Dependence on Starlink Sparks Concern Over Musk’s Unilateral Control

Elon Musk's satellite internet technology, Starlink, has become an essential component of Ukraine's communication infrastructure, causing rising concerns among officials regarding their heavy reliance on this single source. Starlink, a product of Musk's SpaceX, has been instrumental in Ukraine's battle decision-making process amid the Russian invasion.  more

The End of the Experiment

Amidst a firestorm of debate, the Internet Corporation for Assigned Names and Numbers (ICANN) has experimented with various forms of governance of the domain name system (DNS) involving input from the Internet community since its founding in 1998. ICANN's experimentation in running a representative and open corporate decision-making process has largely failed. This failure has manifested itself most explicitly by ICANN's retreat from its effort to enable the direct election of a subset of its Board members and, less explicitly, by the extent to which other efforts to engage the Internet user community in the decision-making process have proven ineffective. more

Big Brands Shooting Themselves In The Foot?

One of the topics that keeps coming up in ICANN policy discussions and as part of the new TLD application process is "transparency". ICANN, and the internet community in general, has had plenty of issues in the past with "bad actors" who have caused a lot of issues for everyone (think of many of the registrars who have lost accreditation in the last couple of years for example). On more than one conference call or policy discussion the issue of a company or a person's track record has come up. more

Canadian Marketing Association Attacks Anti-Spam Bill

With the final Industry Committee review of C-27, Canada's anti-spam legislation, set for Monday afternoon, lobby groups have been increasing the pressure all week in an effort to water down many of the bill's key protections. Yesterday, the Canadian Marketing Association chimed in with an emergency bulletin to its members calling on them to lobby for changes to the bill. While the CMA was very supportive of the bill when it appeared before the committee in June, it now wants to kill the core protection in C-27 - a requirement for express opt-in consent. more

German Authorities Seize Servers of Cybercriminal DDoS-for-Hire Service FlyHosting

FlyHosting had been open for business since November 2022 and was used for malicious activities such as hosting malware, botnet controllers, and carrying out DDoS attacks. more

The ICANN Hunger Games

Adolescents were fascinated by the book and film called "Hunger Games". The plot is about a government forcing people to watch, and forcing some to play, a cruel game for life and death. ICANN's own Hunger Games, the so-called "digital archery" or "batching" process, is not lethal to people, but shares all other features: it is forced upon the participants, it is destructive, unfair and unnecessary. more

Response Policy Zones (RPZs): Use as a Blocklisting Process

Gradually it seems the word is spreading about a new blocking methodology to interrupt the ability of end users to click and visit phishing sites - thereby having their personal information/credentials at risk. This is the DNS Response Policy Zones. DNS RPZs allows companies that run recursive resolvers to create a zone that will not resolve specific domains. more

Disruptive Google Fiber Is Shaking up the Telco World

The Google Fiber project is receiving international attention. This in itself is a good thing, since it brings the benefits of high-speed FttH infrastructure to the attention of large numbers of people in business and government who will not have to deal with such developments on a regular basis... At the same time we have to look at Google Fiber from the point of view of operating in the American regulatory environment. Yes, we can all learn from its disruptive model, and particularly when the results of the more innovative elements of the services begin to kick in; but for other reasons there is no way that this model can be replicated elsewhere. more

IPv6 and MEID’s… Stop Choking on 32 Bits

Both the Internet and North American cellphones are choking under a 32 bit limitation and reactions from protagonists involved in both cases offer striking similarities. 1983 saw the debut of IPv4 and North American mobile telephony started in earnest with Bell's analog AMPS (Advanced Mobile Phone Service). Responding to the need to uniquely identify the growing number of mobile devices in order to bill their owner, the FCC ordered that handsets be equipped with a unique identification number embedded on a chip. This became the 32 bit ESN... more

Holiday Read: Questions of a Global Digital Citizen Before She Enters Her First Self Driving Car

Imagine that you are considering the purchase of your first self-driving car. You anticipate the benefits of sensors and steering that avoid accidents, conserve energy and keep you in contact with emergency personnel should you need help. You unlock the door, get situated in the driver's seat and are about to engage the ignition and then a question pops into your mind, "Is it really safe"? To answer that question, we need to understand first, that the car is not being controlled by Artificial General Intelligence... more

Name Collisions II - A Call for Research

This post is a heads up to all uber-geeks about a terrific research initiative to try to figure out causes and mitigation of name-collision risk. There's a $50,000 prize for the first-place paper, a $25,000 prize for the second place paper and up to five $10,000 prizes for third-place papers. That kind of money could buy a lot of toys, my peepul. And the presentation of those papers will be in London -- my favorite town for curry this side of India. Interested? Read on. more

A Closer Look at the Flame/Flamer/sKyWIper Malware

The world is abuzz this week with some flaming malware - well "Flame" is the family name if you want to be precise. The malware package itself is considerably larger than what you'll typically bump into on average, but the interest it is garnering with the media and antivirus vendors has more to do with the kinds of victims that have sprung up - victims mostly in the Middle East, including Iran - and a couple of vendors claiming the malware as being related to Stuxnet and Duku. more

Are We Ready to Defend Our Freedom? Book Review: “The Age of Surveillance Capitalism”

It is not often that you read a book where afterward nothing seems the same again. Like Adam Smith's The Wealth of Nations, Shoshana Zuboff's book: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power,, puts what we do in these times into a context and gives a focus to ongoing issues of privacy and governance with regard to the Domain Name System. This is even more astonishing as the book does not even mention the DNS, the Internet ecosystem or even Internet Governance directly. more

IPv6 is Growing in Maturity, but Not Necessarily in Adoption

According to Google native IPv6 penetration has structurally crossed the 0.2% mark as a percentage of total traffic on the Internet in early 2011. This may not seem much, but it has doubled in a year, in an Internet that is still growing exponentially. more

The US-China Technology Cold War Battle Over Optical Communication in Space

The United States and its allies are in a technology cold war with China and its allies. This is evidenced by major battles like the US ban on Huawei and China's drive for technological independence and their global infrastructure program to create a digital silk road. (The cold war began under Trump, but President Biden is continuing it). There are other, less well-known battles like the battle over optical communication in space. more