There's a lot of chatter about a recent study purporting to show that 29.1% of internet users has bought something from spam. As ITWire reported, "Marshal were not only interested in how many people were purchasing from a spam source, but also what goods and services they were buying. Perhaps less surprisingly this revealed that sex and drugs sell well online." But at downloadsquad, Lee Mathews discovered the shocking truth: "the survey only involved 600 people." more
We knew that Usenet needed some sort of management system, and we knew that that would require some sort of authentication, for users, sites, and perhaps posts. We didn't add any, though -- and why we didn't is an interesting story. The obvious solution was something involving public key cryptography, which we (the original developers of the protocol: Tom Truscott, the late Jim Ellis, and myself) knew about: all good geeks at the time had seen Martin Gardner's "Mathematical Games" column... more
Space Exploration Technologies Corp. is granted permission from U.S. regulators to deploy over 7,000 satellites. more
A couple of weeks ago during the 40th ICANN meeting in San Francisco I got up to talk at the microphone. I spoke about the needs of developing markets on the web, about the importance of focusing on the 56% of the world that doesn't use Latin character scripts and about the struggles they still face as they go about their everyday lives - chatting, shopping or when pushed, promoting regime change - all using the internet... more
The mobile phone market is growing exponentially and will continue to evolve for years to come. Why has the Cable Industry not moved into the lucrative mobile phone market? It could definitely be a revenue bonanza, as it currently is for telecom companies. ... Verizon and AT&T's revenues, as a percentage of stock price by division, attributes mobile phone service up to 40-42% of total revenues. more
For those people tracking the evolution and deployment of DNSSEC or who are just interested in "DNS security" in general there is a great amount of activity happening next week at IETF 90 in Toronto. I dove into this activity in great detail in a recent post, "Rough Guide to IETF 90: DNSSEC, DANE and DNS Security", and summarized the activity in a Deploy360 post... more
In the first section of this piece, I argued that the anti-Huawei litany only makes sense when one realizes that it is the Chinese state, not a global telecommunication equipment manufacturer based in China, is the target of this attack. China, in this view, is an integrated monolith, and any Chinese firm can be ordered to do the government's will without any legal, political, or economic checks and balances. more
As you've probably read, WikiLeaks has released a trove of purported CIA documents describing their hacking tools. There's a lot more that will be learned, as people work their way through the documents. For now, though, I want to focus on something that's being misreported, possibly because of deliberately misleading text by WikiLeaks itself. Here's the text from WikiLeaks... more
When ICANN implemented the Uniform Domain Name Dispute Resolution Policy (UDRP) in 1999, the number of registered domain names were in the low eight digits. Registered domain names passed the first million in 1997. Today, they are in the first third of nine digits, and continuing to grow. In its newly released publication gTLD Marketplace Health Index (Beta) (July 21, 2016) ICANN offers through a couple dozen metrics a picture of the multiple parts that corporately go into making a healthy marketplace. It's "Beta" because the Health Index is a work in progress. more
The telecoms industry is facing a systemic problem of high operational complexity and excessive cost. We take a look at the root causes, and how to tackle them. Every telco in the world wants to both increase the quality of their customer experience, and also save money by lowering opex and deferring capex. A pervasive industry barrier to achieving this is one of complexity, which exists at many levels. more
Last week hundreds of privacy regulators, corporate officers, and activists gathered in Jerusalem, Israel for the annual Data Protection and Privacy Commissioner Conference. ... Many acknowledged that longstanding privacy norms are being increasingly challenged by the massive popularity of social networks that encourage users to share information that in a previous generation would have never been made publicly available for all the world to see. more
According to reports on Thursday, an anonymous person has Leaked confidential documents of NTC Vulkan, a Moscow-based defense contractor. It is believed that the documents are authentic and have been provided by an anonymous source who was greatly disturbed by Russia's attack on Ukraine. more
On Thursday, Oct 1, 2015, from 9:30am-4:30pm US EDT (UTC-4), Dyn will be holding their "TechToberFest" event in Manchester, NH, and also streaming the video live for anyone interested. There are a great set of speakers and a solid agenda. As I wrote on the Internet Society blog, I'll be part of the security panel from 3-4pm US EDT... and we who are on the panel are excited to participate just for the conversation that we are going to have! It should be fun! more
Who would have thought that typewriters and handwritten letters would ever be back in fashion? But back in 2013 it was reported that Russia was buying large quantities of typewriters. When this was further investigated the country denied that this was for security reasons. Since the Snowden revelations there has been a further rush on typewriters, both by government officials and by a range of, mainly corporate, businesses. more
Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about. more