/ Most Viewed

The Latest on GDPR and WHOIS

GDPR. It's the four-letter "word" everyone is talking about, and there are lots of questions still swirling around the topic. We wanted to provide a summary of where we are and what we believe the next ten days will bring... GDPR enforcement will begin May 25, 2018. After this date, those found in violation of the regulation can be fined up to 4% of annual global turnover or 20 Million Euros, whichever is greater. more

Europe and Data Protection: We Need a Real Debate - Exactly What We Don’t Have Now

Europe is at the forefront of the global debate about data protection and privacy. Unfortunately that debate is characterised more by hyberbole and scaremongering than real discussion. Europeans deserve better -- and so does the world, who rightly see Europe as a leader on this subject. The new Commission has a chance to truly lead in partnership with governments, like Brazil, that agree with us. more

Summary of the Registration Operations Association Workshop

The first Registration Operations Association Workshop took place on Thursday, 16 October 2014, at the Los Angeles Hyatt Regency Century Plaza Hotel. I'd like to thank the 64 people that took the time to attend and participate in the discussion, both in-person and remote. I started the workshop with an introduction to some of the technical challenges being faced by the domain registration industry. more

Satellite Internet Access That Could Be Good

According to The Wall Street Journal, a company called O3b Networks LTD Traditional is planning to launch up to 16 satellites by the end of 2010 to provide Internet access in Africa, the Middle East, and parts of Latin America. This satellite plan, unlike many others, could be good. These are low earth orbit satellites or LEOs so they will be able to avoid the latency problems which are unavoidable with the geostationary satellites used by companies like WildBlue and Hughes to provide "last resort" Internet access in the US. more

Russia to Block VPNs in 2024

Russia's communications regulator, Roskomnadzor, intends to block Virtual Private Networks (VPNs) starting March 1, 2024, according to Senator Artem Sheikin of the United Russia party. more

Charter Approved to Review All Rights Protections Mechanisms in All Generic TLDs

On March 9th, 2016, during its final open meeting at ICANN 55 in Marrakech, Morocco, the Generic Names Supporting Organization (GNSO) Council approved a motion that I proposed to adopt the Charter of the Policy Development Process (PDP) to Review all Rights Protections Mechanisms (RPMs) in all Generic Top-Level Domains. I serve on the Council as one of the two representatives of ICANN's Business Constituency, and my fellow Councilors have designated me to serve as the GNSO's Liaison to the Working Group (WG), and as its Interim Chair. more

Consequences of Opt-in Better Than Best Efforts Internet Routing

While attending the International Telecommunications Society's 17th bi-annual conference I attended yet another network neutrality session. Economists predominated at this conference and their collective read on network neutrality emphasizes the need for ISPs to "extract value" from content providers primarily by converting zero cost peering with ISPs into specific payments from individual content sources. I have no problem with offers of non-neutral, "better than best efforts" routing options to content providers who voluntarily opt in, particularly if the offer is made transparently and anyone can opt in. What troubles me is the impact of opt-in on content providers that opt out... more

Security, Backdoors and Control

Encryption is a way to keep private information private in the digital world. But there are government actors, particularly here in the US, that want access to our private data. The NSA has been snooping our data for years. Backdoors have been snuck into router encryption code to make it easier to break. Today at M3AAWG we had a keynote from Kim Zetter, talking about Stuxnet and how it spread well outside the control of the people who created it. more

The Cyber Security Ecosystem: Collaborate or Collaborate - It’s Your Choice

As cyber security as a field has grown in scope and influence, it has effectively become an 'ecosystem' of multiple players, all of whom either participate in or influence the way the field develops and/or operates. It's increasingly evident that, more than ever, it is crucial for those players to collaborate and work together to enhance the security posture of communities, nations and the globe. more

Mass Surveillance: A Turning Point in Internet History

So far, the debate on mass surveillance has dwelt on the immense resources made available to the agencies (NSA in the US, GCHQ in the UK), on the technological advantage that enables them to access any data and bypass encryption, and on the lack of proper oversight in those two countries. But in order to make their voices heard by their elected representatives, Internet users around the world need to have an even more complete view of the emerging reality. more

Article 22 of the GDPR Should Not Preclude Contemplated Automation

There is an ongoing disagreement among various members and groups in the ICANN community regarding automation -- namely, whether and to what extent automation can be used to disclose registrant data in response to legitimate data disclosure requests. A major contributing factor to the complications around automation has been confusion about how to interpret and apply Article 22 of the GDPR. more

Ralsky Indicted, CAN-SPAM is Still Useless

Well, I read the indictment (available here from Spamhaus.) It's a long litany of criminal behavior, primarily pump and dump stock fraud of a long list of penny stocks from the US and China. Ralsky is described as the "chief executive officer and overall leader" of the scheme... The thing that strikes me about this indictment is that although it includes a lot of CAN SPAM charges, everything Ralsky and Co. did was already illegal under conventional fraud and computer tampering laws. more

WikiLeaks and Stuxnet - Smart Grid Wakeup Calls

The past couple of weeks have been pretty seminal for anyone concerned about the state of Internet security and the bigger picture as to how much we could - do - and should - trust the Web. These two strange words - WikiLeaks and Stuxnet - have suddenly entered our lexicon and there is a lot to be concerned about in the world of smart grid. more

How to Get Your FttH Connection Inside Your House

The Optical Network Terminal (ONT) is the piece of equipment at the end of the Fiber to the Home (FttH) network; the connection to the premises. From here the various services can be delivered to the end-users. In Australia the FttH infrastructure company NBN Co is in favour of having the ONT on the outside of the premises, as that would be the cheapest option and would also allow for easier maintenance. Only in multi-dwelling buildings the ONT will most probably be installed within each unit. more

Biden Administration Probes Chinese Telecom Firms Over U.S. Data Security Concerns

The Biden administration is investigating China Mobile, China Telecom, and China Unicom over concerns that these companies could potentially exploit their access to U.S. data through their cloud and internet services, potentially sharing this data with the Chinese government. more