I've got enormous respect and admiration for the passionate individuals who are still championing .brands for their organisations in the new Top-Level Domain (TLD) program. I have the pleasure of assisting quite a few of these on a daily basis and I'm sure their experiences aren't isolated with other applicants across the globe. Put yourself in their shoes. Delays, some stupid process called Digital Archery, GAC Advice, names collisions and negative media... more
Yesterday, the Asia-Pacific registry got the last two blocks in the central IPv4 pool. The IANA has been sitting on five /8s (one per regional registry), and these will be handed out (along with the fragments from the legacy class B space), one to each registry. The IANA IPv4 registry doesn't yet reflect this. more
Last week, the CEO of ICANN, Fadi Chehadé, announced his intention to leave his position in March 2016, after almost four years as head of the organization. He plans to take a position in private industry, outside of the domain name space. Although the impact to the business community is unclear at this point, Chehadé's departure throws a spotlight on how important ICANN leadership can be in ensuring that business and brand interests maintain their voice in the Internet governance sphere. more
Tragedies frequently result in flurries of legal activity. Last years witnessed the Myspace tragedy in which a 13 year old girl committing suicide. Unfortunately stalking laws have been clumsy tools that are difficult if not impossible for law enforcement officials to wield. Where existing laws respond poorly to tragedies, the option behind Door Number One is to enact a new law, and the option behind Door Number Two is to argue for a reinterpretation of current law that would somehow miraculously shoehorn the tragedy into the law. Unlike game shows, legal contestants can pick both doors -- which is what happened in this case. more
The question is not uncommon these days for someone who has been the principal historian on the ITU over the past 40 years. The short answer is that the institution should do just fine. Indeed, the appearance of bizarre phenomena like Trump, enhance the value and trustworthiness of a stable, globally inclusive intergovernmental venue dealing with matters that by their nature require worldwide cooperation and is buttressed by one of the most highly regarded Secretary-Generals in its history. more
"Outside applications need to be on an equal footing with our own applications," John Donovan said at a SUPERCOMM keynote here in Chicago. "My jaw dropped," one of his colleagues told me a few minutes later, because this is a reversal of AT&T's long-standing position they needed to be able to favor their own applications. AT&T D.C. needs to listen closely to their own CTO, because they are throwing everything they have in D.C. at preventing "non-discrimination" being included in the FCC Net Neutrality regulations. more
2014 will be remembered as the year of the "multistakeholder model" on the Internet. NTIA demonstrated its commitment to bottom-up, multistakeholder Internet governance by committing to complete the transfer of responsibility for various technical functions -- known as the IANA Functions -- to the multistakeholder community. NTIA called on ICANN to convene the community to develop a transition plan to accomplish this goal. more
Cuban requests for Google services are being routed to GCC servers in Cuba, and all Google services that are available in Cuba are being cached -- not just YouTube. That will cut latency significantly, but Cuban data rates remain painfully slow. My guess is that Cubans will notice the improved performance in interactive applications, but maybe not perceive much of a change when watching a streaming video. more
In two recent debate events I participated in, on iFreedom and privacy in the online world, mistrust of government and government's intentions and motivations on and towards the Internet were abundantly present with more than just a few people in the audiences. The emotions were not new to me, no, it was the rationality that surprised and sometimes almost shocked me. Why? Well, should these sentiments get the support of the majority of people, it would undermine all legitimacy of a government to govern. Let's try and take a closer look. more
Researchers at Certfa Lab provide a review of the latest wave of organized phishing attacks by Iranian state-backed hackers which succeeded by compromising 2-factor authentication. more
Yesterday ICANN announced that its new CEO Fadi Chehade accepted ICANN Chief Strategy Officer Kurt Pritz's resignation over conflict of Interests -- will a transparent investigation follow? Otherwise, what else and what next? In a statement on its ICANN website, Fadi Chehade states: "Kurt has submitted his resignation because of a recently identified conflict of interest". more
Last week at Virus Bulletin in 2012, Tyler Moore of Southern Methodist University (SMU) gave a talk entitled "Measuring the cost of cyber crime." It was a study done in collaboration with multiple individuals in multiple countries. The study sought to answer this question - How much does cyber crime cost? Up until this point, nobody really knew. more
I don't want to get into the entire Irish Recorded Music Association (IRMA) vs Eircom and IRMA vs ISPs debacle. The only reason I'm even writing this is because I'm getting a bit tired of all the "quotes" of "quotes" and other unclear and misleading things that people have been saying about ISPs over the last few weeks. more
The penny dropped when I started looking at cloud computing as a service rather than a new technology. In that respect it is more like Google search and a DotCom development than a set of software and hardware tools. That was what I needed to get a better strategic grip on this new concept. As with all services, business strategies are key here, rather than technologies. As soon as it is seen as a technology customer issues often come in second, which then leads to a technology looking for a market... more
A widespread compromise of consumer-grade small office/home office (SOHO) routers has been discovered by threat intelligence group Team Cymru. According to the report, "attackers are altering the DNS configuration on these devices in order to redirect victims DNS requests and subsequently replace the intended answers with IP addresses and domains controlled by the attackers, effectively conducting a Man-in-the-Middle attack." more