/ Most Viewed

A Look at Mail Patterns from Legitimate Webmail Sources

For many years, I have tracked spam from botnets and reported on it. I have analyzed those botnets' distribution patterns by number of IPs, number of messages per email envelope and geographical distribution. While spam from botnets is interesting, and the main source of spam, it is not the only source of spam. What about spam that originates from the MAGY sources? more

Schneier and Kerr on Encryption Workarounds

Bruce Schneier is a famous cryptography expert and Orin Kerr a famous cyberlaw professor. Together they've published a law journal article on Encryption Workarounds. It's intended for lawyers so it's quite accessible to non-technical readers. The article starts with a summary of how encryption works, and then goes through six workarounds to get the text of an encrypted message. more

Debilitating Cyber Attack: Not If, But When?

We all know how easy it can be to ignore or underestimate the possibly, or even likelihood, of a terrorist attack; just remember what happened on 9-11. That seems to be just what the U.S. is doing when it comes to a possible Cyber-Attack, no not in other countries, but right here at home where targets like private sector companies, who provide vital economic and emergency services to our population using broadband infrastructure, and are woefully under-secured for such attacks. more

Do We Need IPv4 at Home/SOHO Any More?

CLAT/NAT64 is utilized across many mobile networks globally, and I am only talking about Ethernet and Wi-Fi in home and small office/home office (SOHO) environments. I experimented by completely disabling IPv4 at home and established a SSID where my MacBook Pro operates without an actual IPv4 address. The MacBook supports CLAT (RFC 6877), and by implementing PREF64 (RFC 8781) and DHCP Option 108 (RFC 8925) in my network, I was able to achieve a 100% IPv6 environment. more

A Look at Why We Need Fibre-to-the-Farm

One of the discussions I am currently having with my international colleagues is about the global trend towards urbanisation and the resulting shift of political, economic and financial powers from centralised states and federal structures to mega-city or mega-urban region centres. Some of my American colleagues expressed the fear that this would further marginalise rural communication. more

IPv6 Adoption Grows By 1900% - Primarily Due to Domain Name Registrar Support

The percentage of zones under .com, .net and .org that support IPv6 has increased by 1,900% over the past 12 months according to a new census conducted by the Measurement Factory, sponsored by Infoblox. According to the census, this dramatic increase can be primarily attributed to the introduction of support of IPv6 by a single domain name registrar, Go Daddy. more

IPv6 Inside Everything and Everybody

With the market for connected humans reaching saturation in advanced economies, mobile operators now see connected devices as the next growth opportunity. 'Everything that can benefit from being connected will be connected', according to Ericsson's CTO (source). In the meantime, Intel dreams of embedding processors into everything that can gain something from communicating. more

Russia Bans Sale of Smartphones, Computers and Other Devices Not Pre-Installed With Russian Software

Russia has passed a law banning the sale of certain devices such as smartphones, computers and smart televisions if not pre-installed with Russian software. more

TPP IP Chapter Leaks Reveal New U.S. Proposed Regulations for Country-Code Domain Names

The leaked Trans Pacific Partnership intellectual property chapter has revealed a number of U.S. proposals including U.S. demands for Internet provider liability that could lead to subscriber termination, content blocking, and ISP monitoring, copyright term extension and anti-counterfeiting provisions. This post discusses Article QQ.C.12 on domain names. more

IPv6 for Mobile Networks: Time to Act Now!

Mobile Network Operators (MNOs) serve the largest constituent of connected devices. There are over 4.6B GSM (and its derivatives) subscriptions today. When you add the CDMA family along with technologies with smaller footprints such as WiMax, IDEN to this list, that number tops 5B mark. On the other hand there are only (yes only!) 800M Internet hosts per ISC. Considering such a small percentage of those 5B or so devices are capable of being an Internet host and out of that percentage even a much smaller percentage is connected at a given time, one can understand the sheer potential of explosion in the number of Internet hosts as mobile devices in the next 3-5 years. more

In Congress, A Confusing Argument Against New TLDs

In a recent post to CircleID entitled New Domains and ICANN Accountability, Steve DelBianco paints himself as "frustrated" that ICANN didn't take a different path toward new Top-Level Domains (TLDs). Mr. DelBianco was one of four witnesses at a hearing before the House Judiciary Committee's Subcommittee on Courts and Competition on September 23, 2009. He is a creative advocate for his clients, an engaging speaker, and a skillful writer, and he produced a synopsis of the hearing which sounded convincing -- until I tried to make sense of it. more

WiFi in All U.S. Federal Buildings

Legislation has been introduced in the US that will require all public federal buildings to install WiFi base stations in order to free up cell phone networks. The Federal Wi-Net Act would mandate the installation of small WiFi base stations in all publicly accessible federal buildings in order to increase wireless coverage and free up mobile networks. The bill would require all new buildings under construction to comply and all older buildings to be retrofitted by 2014. It also orders $15 million from the Federal Buildings Fund be allocated to fund the installations. more

Good Study by UCSD on Economic Realities of Spam and Profit Motives

I recently had a chance to read a report titled, "Show Me the Money: Characterizing Spam-advertised Revenue" produced as a joint effort from the University of California, San Diego (UCSD), International Computer Science Institute, and UC Berkeley by Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorson, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey M. Voelker and Stefan Savage. I also had a chance to hear Chris Kanich speak about the topic - Show Me The Money! This post contains my notes with some photos taken from that report. more

Breaking Down Silos Doesn’t Come Easy

"We need to break down silos", is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but also an EU driven event like ICT 2013 have "Breaking down silos" and "Building bridges" on the agenda. But what does it mean? And how to do so? more

ICANN Clarifying Questions - Question 50 Focus (Part 3 of 3)

If the timeline for turn-around of clarifying questions (CQs) remains two-weeks, the long pole in your CQ tent is likely to be revising your Q50 letter of credit or escrow agreement to meet the ICANN requirements. Based upon ICANN comments, it appears that many applicants are having trouble meeting the specific letter of credit (LOC) or escrow agreement language. To remedy this ICANN should consider publishing what it considers acceptable language for an LOC or escrow agreement. more