Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more
I came across an interesting article on Reuters today: "U.S. securities regulators formally asked public companies for the first time to disclose cyber attacks against them, following a rash of high-profile Internet crimes..." This is a pretty big step for the SEC. Requiring companies to disclose when they have been hacked shifts the action on corporations from something voluntary to something that they have to do. The question is do we want to hear about everything? more
Brazil has been on the news lately, and not for good reasons: an electoral judge order the arrest of Google's Director in Brazil for not complying with a court decision that ordered the removal a YouTube video with allegedly defamatory content. A lot has been said about this, but it seems that many people got it wrong, so let's recap some of the misinterpretations that circulated, specially those at the EFF website. more
On February 4, 2016, U.S. Senator (and Republican Party Presidential nomination contender) Ted Cruz, joined by Senators James Lankford and Michael Lee, dispatched a letter to ICANN CEO Fadi Chehade stating that "we were surprised and dismayed to learn that you have agreed to co-chair a high-level advisory committee for the World Internet Conference, which is organized by the Chinese government, while you serve as the Chief Executive Officer of ICANN under contract with the United States Government". The letter continued by posing a series of nine questions... more
The Internet Society's NY Chapter (ISOC-NY) is delighted to present Milton Mueller's first full exposition of his new book Networks and States: The Global Politics of Internet Governance at NYU on Tuesday December 14 2010. Prof. Mueller is a co-founder of ICANN's NonCommercial User's Constituency and a renowned cyberlibertarian. more
WIPO's newest overview of the Uniform Domain Name Dispute Resolution Policy (UDRP) succinctly states what decisions have made clear through the years: The UDRP's first test is only a "standing requirement." Standing, under the law, simply means that a person or company is qualified to assert a legal right. It does not mean or imply that one will necessarily prevail on any claims. The UDRP includes a well-known three-part test that all trademark owners must satisfy to prevail, but the first element has a low threshold. more
The Internet is about to go independent. After years of support and supervision, the U.S. Government is about to irrevocably relinquish its control over the Internet by transferring its authority to an independent corporation named ICANN. As part of this push, the current chairman of ICANN posted this article to the Wall Street Journal... What's truly amazing about this piece, is how well it's done... It was only after digesting this piece, that I remembered we are talking about ICANN here. more
Kaspersky Lab Expert, Fabio Assolini, has provided detailed description of an attack which as been underway in Brazil since 2011 using 1 firmware vulnerability, 2 malicious scripts and 40 malicious DNS servers, affecting 6 hardware manufacturers, resulting in millions of Brazilian internet users falling victim to a sustained and silent mass attack on DSL modems. more
The Internet Corporation for Assigned Names and Numbers (ICANN) today announced that it has taken over operation of an Internet Time Zone Database that is used by various major computer systems. ICANN agreed to manage the database after receiving a request from the Internet Engineering Task Force (IETF). The database contains time zone code and data that computer programs and operating systems such as Unix, Linux, Java, and Oracle rely on to determine the correct time for a given location. Modifications to the database occur frequently throughout the year. more
Elon Musk's quest to expand his Starlink satellite broadband service into India faces significant pushback from Mukesh Ambani, Asia's wealthiest individual and head of Indian telecom giant Reliance Jio. more
Microsoft today disclosed the detection of covert and targeted malicious activity aimed at critical infrastructure organizations in the United States. The attack is orchestrated by a state-sponsored group from China, known as Volt Typhoon, with the suspected objective of disrupting the communication infrastructure between the U.S. and Asia during potential future crises. more
Hundreds of country and territory domain names are likely to be finally released this year based on the new resolution that calls for ICANN to take "all steps necessary" to do so. more
It has been a busy week in U.S. communications policy, with an FCC meeting adopting important spectrum policy reforms, an FCC complaint about Comcast's approval policies for cable modems, and a dispute between Comcast and Level 3 over fees for Internet backbone traffic. And late last night, it got even more interesting. more
New Cuban regulations regarding private WiFi networks went into effect yesterday, and the New York Times and others proclaimed that "Cuba expands Internet access to private homes and businesses." Yes, Cubans can legally import and install WiFi routers in their homes, small cafes, B&Bs, etc., but these regulations will make little difference in Internet access. more
In simple terms, Meltdown and Spectre are simple vulnerabilities to understand. Imagine a gang of thieves waiting for a stage coach carrying a month's worth of payroll. There are two roads the coach could take, and a fork, or a branch, where the driver decides which one to take. The driver could take either one. What is the solution? Station robbers along both sides of the branch, and wait to see which one the driver chooses. more