/ Most Viewed

India’s Net Neutrality Win: Lessons for Developing Countries

On 8th February, 2015, Internet users celebrated news that the Telecom Regulatory Authority of India had passed regulation prohibiting ISPs from discriminating access to data services based on content". This directive follows similar developments in the U.S, E.U, Chile et al, and is a huge milestone in the fight for Net Neutrality: the principle that ISPs should treat all Internet traffic the same way. Meanwhile, Net Neutrality issues are not unique to India. more

Consequences of Opt-in Better Than Best Efforts Internet Routing

While attending the International Telecommunications Society's 17th bi-annual conference I attended yet another network neutrality session. Economists predominated at this conference and their collective read on network neutrality emphasizes the need for ISPs to "extract value" from content providers primarily by converting zero cost peering with ISPs into specific payments from individual content sources. I have no problem with offers of non-neutral, "better than best efforts" routing options to content providers who voluntarily opt in, particularly if the offer is made transparently and anyone can opt in. What troubles me is the impact of opt-in on content providers that opt out... more

How to Get Your FttH Connection Inside Your House

The Optical Network Terminal (ONT) is the piece of equipment at the end of the Fiber to the Home (FttH) network; the connection to the premises. From here the various services can be delivered to the end-users. In Australia the FttH infrastructure company NBN Co is in favour of having the ONT on the outside of the premises, as that would be the cheapest option and would also allow for easier maintenance. Only in multi-dwelling buildings the ONT will most probably be installed within each unit. more

The Distribution of Botnets Since Rustock Went Down

I pulled together some statistics on my collection of botnet statistics for the period of time between Rustock being shut down and Wednesday, April 6. I wanted to see the distribution of botnets per country - now that Rustock is down, which country has the most botnet infections (as measured by unique IP addresses that send us spam)? more

McCain’s Tech Policy

I was hoping that McCain's Tech Policy would emphasize and extend the two McCain pro-Internet initiatives -- the McCain Lautenberg Community Broadband Act and Spectrum Re-regulation, neither of which have yet seen the light of day -- but it doesn't. In the first case, it makes a vague nod in the direction of "market failure and other obstacles." In the second, it treats spectrum policy as a done deal; now that we can surf the Web in coffee shops, we're done. more

The Latest on GDPR and WHOIS

GDPR. It's the four-letter "word" everyone is talking about, and there are lots of questions still swirling around the topic. We wanted to provide a summary of where we are and what we believe the next ten days will bring... GDPR enforcement will begin May 25, 2018. After this date, those found in violation of the regulation can be fined up to 4% of annual global turnover or 20 Million Euros, whichever is greater. more

White Spaces Could Be the Broadcasters Best Hope

For years, the National Association of Broadcasters (NAB) fought the White Spaces Coalition and others interested in making US "TV white spaces" available for broadband, Wi-Fi or indeed, any new purpose. When the FCC voted 5-0 to permit license exempt use of TV White Spaces, the industry brought suit in Federal court. And they did this, despite rules in the FCC's decision that are so restrictive that, for now, white spaces devices are doomed to commercial failure. more

Security, Backdoors and Control

Encryption is a way to keep private information private in the digital world. But there are government actors, particularly here in the US, that want access to our private data. The NSA has been snooping our data for years. Backdoors have been snuck into router encryption code to make it easier to break. Today at M3AAWG we had a keynote from Kim Zetter, talking about Stuxnet and how it spread well outside the control of the people who created it. more

Article 22 of the GDPR Should Not Preclude Contemplated Automation

There is an ongoing disagreement among various members and groups in the ICANN community regarding automation -- namely, whether and to what extent automation can be used to disclose registrant data in response to legitimate data disclosure requests. A major contributing factor to the complications around automation has been confusion about how to interpret and apply Article 22 of the GDPR. more

Caidagram: Visualising Geographically Annotated Internet Measurements

With measurement networks rapidly evolving up to hundreds of nodes, it becomes more and more challenging to extract useful visualisations from tons of collected data. At the same time, geographical information related to Internet measurements (either known or inferred with state-of-the-art techniques) can be exploited to build tools based on geography as a common knowledge base. We wanted to develop a tool to visualise different classes of geographically annotated Internet data, e.g., topology, address allocation, DNS and economical data. more

FCC Doesn’t Understand How the Internet Works, Say Internet Pioneers in Open Letter

Internet pioneers and leading figures published an open letter today calling on FCC to cancel the December 14 vote on the agency's proposed "Restoring Internet Freedom Order." more

The Cyber Security Ecosystem: Collaborate or Collaborate - It’s Your Choice

As cyber security as a field has grown in scope and influence, it has effectively become an 'ecosystem' of multiple players, all of whom either participate in or influence the way the field develops and/or operates. It's increasingly evident that, more than ever, it is crucial for those players to collaborate and work together to enhance the security posture of communities, nations and the globe. more

What is Bring Your Own IP (BYOIP)?

An IPv4 address identifies your connection to the online world. IP addresses make it possible to host websites, manage secure communication, and engage in countless other essential, internet-related activities. Typically, when migrating to a new cloud provider, a business has only one path: lease the provider's IP addresses. But what if a business already has a block of IP addresses? more

Supporting Organizations Marginalized in ICANN Accountability Proposal

The Cross Community Working Group on Enhancing ICANN Accountability (CCWG-Accountability) make a number of helpful recommendations to improve organizational accountability at ICANN, however one aspect of the plan is deeply flawed: changing the role of ICANN's Governmental Advisory Committee (GAC) from purely an "advisory" role to a "decision making" role over fundamental matters at ICANN, including its governance. more

New gTLD Target Date is April 23? Or is it?

I detect some delight in the domain name community today resulting from Video interview with ICANN CEO Fadi ChehadĂ©. In that interview ChehadĂ© states "We are now targeting to be able to recommend for delegation the first new gTLD as early as the 23rd of April..." On the surface this sounds like very good news. more