/ Most Viewed

CENTR Releases Paper on Why We Need Multistakeholder Internet Governance

In a recently released paper by the Council of European National Top-level Domain Registries (CENTR), authored in collaboration with Chris Buckridge, the spotlight is once again on the multistakeholder approach to Internet governance. more

The Countdown Has Started – Here Come One-Year Digital Certificate Life Cycles

Apple announced its decision to trust only one-year digital certificates on its Safari browser in February 2020. This decision created a domino effect, with Mozilla and Google following suit; certificate providers announced they would not issue two-year certificates after Aug. 19, 2020. We wrote an article in March to help brands to prepare for this change. more

I’m Shocked, Shocked to Find There’s Cryptanalysis Going On Here (Your plaintext, sir.)

There's been a lot of media attention in the last few days to a wonderful research paper on the weakness of 1024-bit Diffie-Hellman and on how the NSA can (and possibly does) exploit this. People seem shocked about the problem and appalled that the NSA would actually exploit it. Neither reaction is right. In the first place, the limitations of 1024-bit Diffie-Hellman have been known for a long time. RFC 3766, published in 2004, noted that a 1228-bit modulus had less than 80 bits of strength. That's clearly too little. more

12 Million New Domains Registered in Frist Quarter 2016, Total Domains Reach 326.4 Million Worldwide

Total number of domains names across all top-level domains grew to 326.4 million in the first quarter of 2016, Verisign reported today. more

Why Integrating IPAM Matters and How to Achieve It

IPAM solutions are the source of truth for IP resources on the network, but when performing IPAM functions such as assignments, reconciliations, DNS updates, network plans, or Regional Internet Registry (RIR) requests, IPAM is often limited by its integration with an OSS. Operational teams can find it challenging to complete routine tasks without an integrated IPAM solution due to siloed data pools and swivel-chair environments. more

Correcting Federal Databases: A Procedural Guide

Federal databases, such as those being compiled by the Consumer Financial Protection Bureau and the Federal Trade Commission, contain data about many people and businesses. Although some of this data may be protected personal information (PPI), there is also extensive information in federal databases that is publicly disseminated via the internet. If the information is wrong, it has the potential to be a vector of tortious mischief. more

Thailand Passes Law Giving Sweeping Powers to State Cyber Agencies

Thailand's military-appointed parliament on Thursday passed a controversial cybersecurity law which gives sweeping powers to state cyber agencies. more

American Households Estimated to Save Over $30 Billion a Year on Broadband With LEO Satellites

Low Earth Orbit (LEO) satellites are still in their infancy, but according to one analysis, the technology could save American households more than $30 billion per year by intensifying broadband competition more

Most of the Time Common Sense Eventually Prevails

I have learned that lesson many times over. In many of the issues that we are facing, as a society or in our industry, I am reasonably confident that common sense will eventually prevail. Sometimes the road twists and turns, but in the end water flows around rocks. In our industry I can refer to developments we have been advocating for (structural separation, utilities-based telecoms infrastructure, broadband for social and economic benefits, ICT-based industry and sector transformation, FttH, internet as a tool for more direct democracies, etc). more

High-Performing Cloud Networks Are Critical to M2M Success

Machine to machine (M2M) communications may not be new, but with the rapid deployment of embedded wireless technology in vehicles, appliances and electronics, it is becoming a force for service providers to reckon with as droves of businesses and consumers seek to reap its benefits. By 2020, the GSM Association (GSMA) predicts that there will be 24 billion connected devices worldwide, while Forrester predicts that mobile machine interactions will exceed the number of mobile human interactions more than 30 times. more

IP Address Space Covered by Certificates

Since the RIPE NCC launched its Resource Certification service, there is a steady increase in the number of prefixes covered by certificates. The Resource Certification (RPKI) service was launched at the beginning of 2011. The system enables network operators to perform Border Gateway Protocol (BGP) origin validation, which means that they can securely verify if a BGP route announcement has been authorised by the legitimate holder of the address block. more

Using LEOs and GEOs

Once you head away from the areas serviced by modern terrestrial cable infrastructure, the available digital communications options are somewhat limited. Some remote areas are served using High-Frequency radio systems, using radio signals that bounce off the ionosphere to provide a long-distance but limited bandwidth service. Or there are satellite-based services based on spacecraft positioned in geostationary orbital slots. more

Cruz Is Back Now with a Countdown Clock To “Doomsday”

Senator Cruz' crusade against the IANA transition is back in full swing. With the deadline for the expiry of the IANA contract approaching both he and other anti-transition types have been working hard on their campaigns to block the transition. The latest addition to the Cruz website is a special lander page featuring a countdown clock... Yes, that's an image of President Obama shaking hands with China's Xi Jiping. more

DNSSEC Maintenance - Just Like Mowing the Lawn

DNSSEC is a hot topic. It's a technology newly unleashed on popular networking, which has led to countless articles and posts on the subject, including right here on CircleID. The way a lot of articles try to get your attention is to talk about a technology, like DNSSEC, in a way that makes the technology either seem really significant or really complicated. That is why a lot of articles about DNSSEC make it sound like something huge, complicated, and scary. But it's not. more

The .BEST Acquisition: 3 Months After

The .BEST new gTLD Registry was acquired 3 months ago by Cyril Fremont, a French Entrepreneur from Paris, and a team of investors. I took the time to meet with Cyril in the latest ICANN63 meeting in Barcelona to ask him a few questions about his future new gTLD project, three months after it was acquired from the previous owner... .best has just released the MVP (Minimum Viable Product) of the social network. The ".best" social network will be officially present at the next Namescon... more