/ Most Viewed

(DNS) Security Protocols Do What They Say on the Tin

DNS-over-TLS has recently become a welcome addition to the range of security protocols supported by DNS. It joins TSIG, SIG(0) and DNSSEC to add privacy, and, in the absence of validating stub resolvers, necessary data integrity on the link between a full-service resolver and the users' stub resolver. (The authenticated source feature of TLS may also offer some additional benefits for those of a nervous disposition.) Good stuff. What is not good stuff is... more

Email More Secure Today Than Two Years Ago, Research Suggests

Google in partnership with the University of Michigan and the University of Illinois, has published the results of a multi-year study that measured how email security has evolved since 2013. Although Gmail was the foundation of the research, insights from the study are believed to be applicable to email more broadly. more

The Issue Is the Digital Economy, Not Broadband

After some five years of public debate on the national broadband network it is heartening to see that more and more people are getting the message that the network means more than just fast internet access. Increasingly key decision-makers in business and government are reaching an understanding of the transformation that is underway in the economy. more

The CSTD WG on IGF, Multi-Stakeholderism, and Short Deadlines

One of the many Internet governance discussions currently taking place is at the CSTD Working Group on improvements to the IGF, which is due to have its second and final meeting on 24 and 25 March 2011. Despite an unpromising beginning, with only governments on the Working Group (WG), it is now a multi-stakeholder environment, with the technical, business and civil society represented at the WG and genuinely welcomed by governments to participate in the WG's deliberations. more

Time to Stop Talking About Unserved and Underserved

I work with communities all of the time that want to know if they are unserved or underserved by broadband. I've started to tell them to toss away those two terms, which is not a good way to think about broadband today. The first time I remember the use of these two terms was as part of the 2009 grant program created by the American Recovery & Reinvestment Act of 2009. The language that created those grants included language from Congress that defined the two terms. more

India’s Net Neutrality Win: Lessons for Developing Countries

On 8th February, 2015, Internet users celebrated news that the Telecom Regulatory Authority of India had passed regulation prohibiting ISPs from discriminating access to data services based on content". This directive follows similar developments in the U.S, E.U, Chile et al, and is a huge milestone in the fight for Net Neutrality: the principle that ISPs should treat all Internet traffic the same way. Meanwhile, Net Neutrality issues are not unique to India. more

How Buying the Right Domain Name Is Different

This post outlines a typical information-gathering process for online purchasing decisions and demonstrates why a different approach is needed when buying a domain name. Huge amounts of product information are now publicly available on the Internet. When buying most products, consumers rely on that wealth of information. About 70% of consumers make online reviews a key part of their buying choices, according to a 2012 Nielsen survey. more

Blocking Shodan

The Internet is chock full of really helpful people and autonomous systems that silently probe, test, and evaluate your corporate defenses every second of every minute of every hour of every day. If those helpful souls and systems aren't probing your network, then they're diligently recording and cataloguing everything they've found so others can quickly enumerate your online business or list systems like yours that are similarly vulnerable to some kind of attack or other. more

The Distribution of Botnets Since Rustock Went Down

I pulled together some statistics on my collection of botnet statistics for the period of time between Rustock being shut down and Wednesday, April 6. I wanted to see the distribution of botnets per country - now that Rustock is down, which country has the most botnet infections (as measured by unique IP addresses that send us spam)? more

Net Neutrality and Google/Verizon

What surprises me about the Google/Verizon deal is not that they have come to agreement, but that they have taken so long to do so. What they have agreed to is essentially what I proposed they do back in 2006. What Google want and what Comcast, Verizon and the carriers want is not and was not incompatible. more

From Connectivity to Sustainability: The Role of Internet Governance in Realizing the SDGs

In the digital era's transformative landscape, the intersection of Internet Governance and Sustainable Development emerges as a focal point for global discourse. It is widely recognized that the Internet, in its vast potential, holds the key to unlocking solutions for many of the challenges we face. However, this potential could be significantly underutilized, or worse, lead to adverse effects without a robust governance framework. more

Satellites Directly to Cellphones

AT&T and satellite company AST SpaceMobile announced a partnership to provide satellite cellular service directly from satellites to cellphones. This will provide a service that is much needed for the billions of remote users who are not in the range of a cell tower. This is an emerging industry that is still being referred to by different acronyms. more

How to Get Your FttH Connection Inside Your House

The Optical Network Terminal (ONT) is the piece of equipment at the end of the Fiber to the Home (FttH) network; the connection to the premises. From here the various services can be delivered to the end-users. In Australia the FttH infrastructure company NBN Co is in favour of having the ONT on the outside of the premises, as that would be the cheapest option and would also allow for easier maintenance. Only in multi-dwelling buildings the ONT will most probably be installed within each unit. more

FCC Doesn’t Understand How the Internet Works, Say Internet Pioneers in Open Letter

Internet pioneers and leading figures published an open letter today calling on FCC to cancel the December 14 vote on the agency's proposed "Restoring Internet Freedom Order." more

Making the Wireless World More Web-Friendly

Your wireless carrier (in the U.S., probably AT&T or Verizon Wireless) has a lot of control over the handset you can use and the applications that can run on that device. In fact, wireless carriers routinely ask for (and get) an enormous slice of the revenue from applications that work on their networks, and they force handset manufacturers to jump through all kinds of hoops in order to be allowed to sell devices that can connect to these networks... This has had bad effects on the ecosystem of the wireless world. more