In December 2018, a bill on the "stable operation" of the Russian segment of the Internet was introduced and got the title "Sovereign Runet" in mass media and among the public. It was adopted after 5 months later, despite doubts about the technical feasibility of its implementation. The law is very ambitious in its intent to simultaneously control Internet traffic and protect Runet from some external threats, but legislators still have no idea how it would actually work. more
Those of us who have been working on IPv6 for over 15 years know what it means to be an advocate for an infrastructure technology that cannot be easily tied to new revenue or short-term risks. It is a battle on an icy uphill slope with head winds and a gallery of skeptics who call themselves realists and cheer your every bruise. This has often made us cheer any news of a new IPv6 deployment, as a means to keep faith. However in doing so, it sometimes made us overlook the substance of that news... more
Since the world went virtual, often by using Zoom, several people have asked me if I use it, and if so, do I use their app or their web interface. If I do use it, isn't this odd, given that I've been doing security and privacy work for more than 30 years, and "everyone" knows that Zoom is a security disaster? To give too short an answer to a very complicated question: I do use it, via both Mac and iOS apps. Some of my reasons are specific to me and may not apply to you... more
The US government’s most recent broadband statistics from the FCC claims 25 million Americans to be lacking access to a broadband connection. more
I was fascinated to read today that over $1 billion (USD) in payments were made on Venmo in January 2016. What is Venmo, you might ask? Essentially it is a mobile app (on both iOS and Android) that provides an easy payment system, in many ways like a "digital wallet" where you can securely reach in and pull out some cash to give to someone... more
For the first time ever bankers have launched an EFTPOS advertising campaign. Could this be an indication that they are becoming worried about the competition they are getting from internet companies such as PayPal, Amazon, Google and Apple (iTunes)? The digital economy is growing much faster than the bricks-and-mortar economy and, while EFTPOS is not going away anytime soon, an increasingly large amount of money is now bypassing their systems. more
The draft e-commerce policy paper of the Ministry of Commerce and Industry of India raises valid observations concerning some of the imbalances, such as, on the excessive advantages gained by the "first movers" in the private sector, which implies advantages gained by the first -mover States on the Internet, on some of the prevailing gaps in the space and also on concerns about the abusive practices by a few e-commerce platforms and vendors. Most of these concerns are best addressed globally... more
It looks like Senator Cruz' letter writing campaign isn't going to end any time soon. While previously the Senator and former US presidential hopeful was happy exchanging salvoes with ICANN he's now switched gears and is instead focussing on NTIA and the US Department of Commerce. The latest letter is focussed on a very strange interpretation of the IANA transition proposals. more
Databases are the infrastructure of the modern administrative state and data is its lifeblood. When the data is contaminated with errors, federal agencies have difficulty performing even the most basic administrative functions such as managing its inventory of office space and protecting the personally identifiable information (PII) of social security number holders. The federal dissemination of unreliable data doesn't just waste money; it undermines public trust in government and leaves it unmanageable. more
We all take the predictability and reliability of other utilities for granted. So why is broadband such a frustrating exception? Why do our Skype calls fail mid-way? What makes Netflix buffer like crazy? How come our gaming sessions are so laggy? Imagine if the design of your electrical supply was optimised to apply the biggest possible voltage and current to anything that was plugged in. That would clearly be ridiculous! more
A new IETF draft outlines critical limitations of DNS in supporting the Internet of Autonomous Things, highlighting challenges related to latency, mobility, security, and privacy, and proposing architectural improvements to meet evolving machine-driven demands. more
The Dot Gay Alliance has announced plans to create the .GAY top-level domain (TLD) that also aims to become a source of funding for the LGBT civil rights groups in the US and abroad. The Dot Gay Alliance is led by Founder & Executive Director Joe Dolce, whose media strategy firm, DolceGoldin, provides communications services for the Alliance, according to the announcement released today. Dot Gay Alliance supporters include, New York City Council Speaker Christine C. Quinn and Sunil Babu Pant, the first openly gay member of the Nepal Parliament. more
On the face of it, the answer is a rather obvious and simple "yes"! The Internet obviously works across borders. Technically, it is a global network servicing its users wherever they may be on the planet. But it is this very nature -- the fact that the Internet is not bound to a specific country or territory -- which has more and more people asking themselves whether it can really work across borders. more
Human rights are a topic that came up several times at the IETF meeting that just ended. There's a Human Rights Research Group that had a session with a bunch of short presentations, and the featured two talks at the plenary asking, 'Can Internet Protocols Affect Human Rights?' The second one, by David Clark of MIT, was particularly good, talking about "tussle" and how one has to design for it or else people will work around you. more
Once again I find myself thinking about the nature of the asymmetric warfare threat posed by politically motivated DDoS (Estonia in 07, Korea in 02, and now China vs. CNN in 08). I keep thinking about it in terms of asymmetric warfare, a class of warfare where one side is a traditional, centrally managed military with superior uniformed numbers, weaponry, and skill. On the other we have smaller numbers, usually untrained fighters with meager weapons, and usually a smaller force. Historical examples include the North Vietnamese in the 20th century and even the American Revolution in the 18th century. Clearly this can be an effective strategy for a band of irregulars... more