/ Most Viewed

AI Boom Spurs Record Investment in Undersea Cables Amid Geopolitical and Security Concerns

As AI accelerates global data demand, tech giants are investing heavily in subsea cables. These critical networks face rising geopolitical scrutiny and security risks, reshaping the future of digital infrastructure and global connectivity. more

ICANN’s WDPRS Report and Plan to Clean Up Whois Records

ICANN's recently released report, ICANN's Whois Data Accuracy and Availability Program: Description of Prior Efforts and New Compliance Initiatives [PDF], is a summary of the Whois Data Problem Report System's (WDPRS) reports spanning a one-year period that concluded at the end of Fenruary 2007. In case you're not familiar with the WDPRS, it's system that tracks complaints about inaccurate or incomplete whois entries. Notable facts from the report include: There were 50,189 reports for which ICANN received follow-up responses during the year... more

France to Stop Using Google as Part of Its Plan to Establish Digital Sovereignty

The 2013 NSA revelations by the American whistleblower Edward Snowden was a stern wake call for French politicians. more

Ignore The Chicken Littles: Let’s Give New Web Domains a Try

Before the experiment has gotten off the ground, some critics have expressed concern about applications to operate domains referring to a "generic" product or service, like .car, .book, or .app. News reports indicate that Microsoft and other Google competitors have filed complaints about Google's applications, while authors' organizations have raised questions about some of Amazon's applications. These complaints assert that giving these applicants the right to operate these new domains would provide an unfair competitive advantage. more

What to Know About an ICANN Compliance Audit, and How to Handle One if You Are Selected?

Now that new gTLD registries have been operating for more than a year, a few registries have already experienced going through an audit and a few more are now receiving notifications that they are next in line. For all, the process of going through an ICANN audit is a first. Once you receive the Request for Information (RFI), you will have 15 days to respond, or seek an extension of time. Extensions may be available on a case by case basis. more

IPv6 Medics Without Borders

At its November 5th plenary, the Canadian ICT Standards Advisory Committee approved the recommendations of the Canadian IPv6 Task Group set up by isacc in april. The 50 members of the Task Group were invited to individually produce a list of seven recommendations. Received inputs were collated, debated, ranked and ultimately distilled down to a pair of quite straightforward recommendations for immediate action. more

Interplanetary Internet

We had a very interesting presentation and discussion regarding the topic of interplanetary internet with my international colleagues, of which Vint Cerf – one of the “fathers of the internet” – is also a member. As a partner of the Interplanetary Networking Special Interest Group (IPNSIG), he took us on a journey that he has been involved with over the last 20 years regarding communication networks in space. A true mind-broadening experience. more

Software Defined Networks and Integration of Wifi with 3G/4G for R&E Networks

A number of R&E networks such as SURFnet, JANET, AARnet, etc. are actively promoting mobile services and looking at integration of campus Wifi with 3G/4G networks using Eduroam. Mobile wireless services promises to be major service offering for R&E networks as the Internet of Things and Machine to Machine (M2M) becomes increasingly critical for research. Applications such as personal medical devices on (or in) the body, environmental sensors, traffic monitors and even garbage truck tracking will need such networks. more

As a Service?

I'm happy to have the option of buying services. It's easier to eat at a restaurant than to do my own cooking, and I'm happy to pay for a ride rather than fighting traffic on my own. However, I'm not happy if I don't have the option of cooking for myself or of taking a stroll. I used to be willing to pay for all of my phone calls but today I know that, thanks to VoIP, there is no need to. But the phone companies are attempting to wrest back control with their wider 5G agenda. more

Logjam, Openssl and Email Deliverability

RHEL6/Centos6 (and presumably RHEL7/Centos7) machines with the latest openssl packages now refuse SSL connections with DH keys shorter than 768 bits. Consider RHEL6 sendmail operating as a client, sending mail out to a target server. If the target server advertises STARTTLS, sendmail will try to negotiate a secure connection. This negotiation uses openssl, which will now refuse to connect to mail servers that have 512 bit DH keys. The maillog will contain entries with "reject=403 4.7.0 TLS handshake failed". more

Rewiring Internet Governance: Choice and Control (Part 2)

It is tempting to write off ICANN as a U.S. foreign policy lackey and that's all there is to say about ICANN. However, if the mantra for rewiring governance means "lets get ICANN" we risk missing forest for trees. ICANN is merely the symptom of a dysfunctional governance predicament that somehow (despite best efforts) skews oversight. Shapiro, for example, regards oversight as a "game" (1994). His "delegation dilemma" or "agency problem" stems from two options, neither of which are attractive vis-á-vis governance. more

Update on AS Path Lengths Over Time - How Interconnected is the Internet?

With the number of ASes connected to the Internet constantly increasing, one could expect that the length of the AS paths would also increase as the network as a whole gets wider. However, this doesn't seem to be the case. Also, with IPv6 being more widely deployed, how does the interconnectedness of the IPv6 portion of the Internet compare to IPv4? more

The $100 Billion National Broadband Plan for America

The new Administration in the USA laid out a $100 billion proposal for broadband investment as part of its $2 trillion infrastructure plan. Under the proposal, the plan is to provide national broadband coverage. The Administration will use better competition measures, such as price transparency, the use of public utility infrastructure, and subsidies for low-income households to achieve its goals. more

Achieving a Cyber-Reliant Infrastructure

Don't worry about the bad guys turning out the lights. Worry about everything they're stealing while the lights are still on. The theft of intellectual property ranging from Hollywood films to defense secrets is underway by cyber-criminals of various stripes. Maintaining control over intellectual property may be the single most important challenge to American economic security. Implementing a cyber-reliant infrastructure is a national challenge which crosses the traditional boundaries between economic sectors and between public and private domains. more

A Netmundial+10 Could Help Redefine Pathways for Internet Governance in the Global South

The original Netmundial was a unique Internet governance event that took place in 2014 and set out to map new avenues for global cooperation around the theme, uniting diverse stakeholders to discuss the future of IG in a broad manner. It was initially convened by the Brazilian government and ICANN as an answer to the Snowden revelations of global Internet espionage performed by various nations (primarily the USA), in part due to these two actors being directly affected by the implications of the revelations. more