There has long been pressure from governments to provide back doors in encryption systems. Of course, if the endpoints are insecure it doesn't matter much if the transmission is encrypted; indeed, a few years ago, I and some colleagues even suggested lawful hacking as an alternative. Crucially, we said that this should be done by taking advantage of existing security holes rather than be creating new ones. more
Do you live in the Asia-Pacific region and are interested in accelerating the deployment of key technologies such as IPv6, DNSSEC, TLS or secure routing mechanisms? If so, my Internet Society colleagues involved with the Deploy360 Programme are seeking a "Technical Engagement Manager" based somewhere in the AP region. Find out more information about the position, the requirements and the process for applying. more
To claim a superior right to a string of characters mark owners must (first) have priority (unregistered or registered) in using the mark in commerce; and secondly, have a mark strong enough to rebut any counter argument of registrant's right or legitimate interest in the string. A steady (albeit small) number of owners continue to believe it's outrageous for registrants to hold domain names earlier registered than their trademarks and be permitted to extort amounts far "in excess of [their] documented out-of-pocket costs directly related to the domain name." more
The decision to bid for a new gTLD can be driven by reason or by love. Either the applicant practices strategic and financial valuation, or the applicant falls for an idea implicit in the gTLD. The second group had better be very lucky or have some motivation besides profit. They enjoy little chance of economic viability. Worse, they follow up their poor initial selection with similar bad calls about their marketing message. more
I've written that a Network Neutrality law needs a Network Management Exception, and I've laid out how this exception is likely to become a giant vacuum-cleaner-fish loophole. The way out is the separation of infrastructure from service, so infrastructure operators can have no financial interests in the services they carry, hence no motive to discriminate in anti-competitive ways. Now today's Financial Times has an editorial on the EC telecom regulator, Viviane Reding's proposal to beef up national telecom regulatory authority within European countries and create a Europe-wide so-called super-regulator. more
The Los Angeles-based hosting company, DreamHost on Monday revealed that for the past several months it has been dealing with a search warrant from the Department of Justice pertaining to a website used to organize protests against President Trump. more
The Internet was built on the promise that everyone, everywhere could create, share information and ideas without frontiers. Yet, Internet restrictions are increasing to the point they are becoming the norm. And it's happening fast. In its 2016 Freedom on the Net report, Freedom House revealed that Internet freedom declined for the 6th year in a row. The report notes that more governments have been blocking social media and communication apps than ever before. more
Last week the European Network and Information Security Agency (ENISA), which assists the European Commission and its member states with network and information security issues, published its third Anti-Spam Measures Survey. The survey provides insight into how network operators in Europe are responding to the continued onslaught of email spam. more
2016 broke the previous all-time high, set back in 2013, for the number of records exposed from reported data breaches. more
More than 1,000 experts in the artificial intelligence community have called for an immediate pause on the development of "giant" AI systems like GPT-4 for at least six months. more
If you are passionate about ICT policy, Peering, and Interconnection, then the Africa Peering and Interconnection Forum (AfPIF) is the place to be. The 7th annual AfPIF takes place in Dar es Salaam, Tanzania from 30 August – 1 September 2016. AfPIF is a multistakeholder forum organized by the Internet Society that brings together a diverse range of business leaders, infrastructure providers, Internet service providers (ISPs), Internet Exchange Points (IXPs), international financial institutions, policy-makers, and regulators from all over the world. more
"Net neutrality" is implicitly framed as a debate over how to deliver an equitable ration of quality to each broadband user and application. This is the wrong debate to have, since it is both technically impossible and economically unfair. We should instead be discussing how to create a transparent market for quality that is both achievable and fair. In this paper I propose an alternative approach that (potentially) meets the needs of both consumer advocates and free market proponents. more
The world of networking tends to be bistable: we either centralize everything, or we decentralize everything. We started with mainframes, passed through Lotus 123 hidden in corners, then to mini's and middleware, then to laptops, and now to the cloud, to be followed by fog. This particular cycle of centralization/decentralization, however, has produced a series of overlapping changes that are difficult to decipher. You can somehow hear someone arguing about disaggregation and hyperconvergence through the fog -- but just barely. more
It's official. A team of market analysts from Oppenheimer are saying [PDF] what I've been saying since 1997, that the apps are separating from the network, and this is driving a wave of "explosive innovation." more
The new Global Phishing Survey released by the Anti-Phishing Working Group (APWG) this month reveals that phishing gangs are concentrating their efforts within specific top level domains (TLDs), but also that anti-phishing policies and mitigation programs by domain name registrars and registries can have a significant and positive effect. The number of TLDs abused by phishers for their attacks expanded 7 percent from 145 in H2/2007 to 155 in H1/2008. The proportion of Internet-protocol (IP) number-based phishing sites decreased 35 percent in that same period, declining from 18 percent in the second half of 2007 to 13 percent in the first half of 2008. more