VoIP remains a hot topic in the IP communications world, but it's definitely evolving. The following is my most recent article for a column that I write for TMCnet, and it's a year-end review on VoIP as well as my outlook for how it's changing for 2009. Colleague Alec Saunders posted his response to my article yesterday, and it's a good read. If you're interested in where VoIP is headed, then my article should help keep that dialog moving along within the CircleID community. Here we go... more
Progress is being made towards launching a .eu top-level domain for European individuals, business and organisations.
On 22 May 2003, the European Commission announced its decision to designate the European Registry for Internet Domains (EURID) as the Registry for the new top-level domain (TLD) .eu. EURID is made up of three founder members ? the registry operators for the country code top-level domains (ccTLDs) .be (Belgium), .it (Italy) and .se (Sweden). The Commission?s decision follows a call for expressions of interest published last September and an evaluation by independent experts of the seven applications received. more
If only I had been able to predict the new gTLD future, but alas my crystal ball (well, really it's a Magic 8 Ball ®) did little to help me. And I really doubt that 5+ years ago, when this new gTLD journey began, that anyone could have predicted where we are now. All that said, back in 2008, I wish I could have known that... more
In what seems to have started with a blog post by reverse engineer Halvar Flake, and subsequent blog postings from other experts in the know, the details of the recently announced DNS vulnerability was quite likely made public today. The DNS flaw was found earlier this year by security researcher Dan Kaminsky and earlier this month announced publicly along with various tools and patches provided by numerous vendors... more
Duncan Geere reporting in Wired: "Since the slow introduction of internet monitoring systems around the world began, more and more people have attempted to preserve their privacy by signing up for VPN services like the Pirate Bay's Ipredator and Pirate Party offering Relakks. But it turns out that there's a gaping security flaw in these services that allows individual users to be identified..." more
A secret weapon is falling into dangerous hands. Organized cybercriminals are building up portfolios of cybersquatting domain names. A smart operator with such a portfolio can go beyond simple stealing and competing full out for traffic and revenues. Rightful brand owners, feeling the squeeze, will find out too late that the bandits have the money to fight legal action. The time to act is now, before pieces of the playing field have been bought up by the enemy. more
Once we decide that Network Neutrality is a good thing to (re)enshrine in law, then we need to ask how to do that effectively. One way would be to pass a law saying, "Thou shalt not discriminate." That's the current approach. But network operators will say that they must manage their network, and if, in the course of network management, they were to disadvantage some source, destination, application, service or content, they might be accused of violating the law. So any Network Neutrality law must have a Network Management Exception... more
ome 50 years ago, at the Palo Alto Research Centre of that renowned photocopier company Xerox, a revolutionary approach to local digital networks was born. On the 22nd of May 1973, Bob Metcalf authored a memo that described "X-Wire," a 3Mbps common bus office network system developed at Xerox's Palo Alto Research Center (PARC). more
When rolling out a new protocol such as IPv6, it is useful to consider the changes to security posture, particularly the network's attack surface. While protocol security discussions are widely available, there is often not "one place" where you can go to get information about potential attacks, references to research about those attacks, potential counters, and operational challenges. more
Over at the site V3.co.uk, they have an article up today alleging that since the Rustock takedown two weeks ago, the bagle botnet has moved to take over as the botnet that is responsible for sending the most spam. They have not replaced Rustock's total spam volume, only that they are now the number one spam sending botnet. more
Listed below is correspondence that I have submitted to ICANN's general counsel in connection with the organization's stated documentary information disclosure policy. more
As industries from agriculture to banking increasingly depend on space-based capabilities, safeguarding satellites from cyber threats has become paramount. In a groundbreaking move to address this, the U.S. military will stage Hack-A-Sat 4, a competition at the famed DEFCON hacker convention, inviting white-hat hacker teams to attempt to infiltrate and control computer systems on a satellite in orbit. more
Very few African states today have developed a national cybersecurity strategy or have in place cybersecurity and data protection regulations and laws. Yet, the continent has made major headway in developing its digital ecosystem, and moreover, it is home to the largest free trade area in the world, which is predicted to create an entirely new development path harnessing the potential of its resources and people. more
I approach the mic. As the adrenalin kicks in, my hands begin to slightly tremble. Eyes dart at me, anticipating my imminent speech. I glance at the scribbled text in my notebook to review the key points I hastily made; breathe in, exhale. I look up; the total silence is punctured by my poised words: "My name is Michael Oghia, and I am an Internet Society Ambassador." more
As you might imagine, I've been following the ITU's Plenipotentiary Conference very closely. It was built up to be the great showdown of our time -- the pro-'free and open' Internet in one corner (comprised for the most part of developed and democratic nations), in the other corner a contingent of totalitarian regimes bent on a fractured, censored Internet -- a near battle royale for control of one of the greatest communications tool the world has ever seen. more