Two factor authentication that uses an uncopyable physical device (such as a cellphone or a security token) as a second factor mitigates most of these threats very effectively. Weaker two factor authentication using digital certificates is a little easier to misuse (as the user can share the certificate with others, or have it copied without them noticing) but still a lot better than a password. Security problems solved, then? more
Privacy problems are an area of wide concern for individual users of the Internet -- but what about network operators? Geoff Huston wrote an article earlier this year concerning privacy in DNS and the various attempts to make DNS private on the part of the IETF -- the result can be summarized with this long, but entertaining, quote. more
In the fall of 1998, I was present at the first meeting of the ICANN Board which was then made up of very senior, prominent parties from a broad spectrum of sources. Much to her credit, Esther Dyson accepted the position as the first Chair of the ICANN Board for the newly birthed organization. I was in attendance in support of the nomination of Michael Roberts as the first ICANN CEO. It was a time of uncertainty. more
The source code for the IoT botnet 'Mirai' has been released," warns security expert Brian Krebs whose own website was targeted with the same botnet resulting in the historically large DDoS attack last month. more
Rodney S. Tucker reporting in IEEE Spectrum: "In April 2009, Australia's then prime minister, Kevin Rudd, dropped a bombshell on the press and the global technology community: His social democrat Labor administration was going to deliver broadband Internet to every single resident of Australia... So now, after three years of planning and construction, during which workers connected some 210 000 premises (out of an anticipated 13.2 million), Australia's visionary and trailblazing initiative is at a crossroads. The new government plans to deploy fiber only to the premises of new housing developments." more
Here in the United States, we recently celebrated Thanksgiving and with that, we now enter the last weeks of 2018. I've spent much of this past year involved in ICANN's Expedited Policy Development Process (EPDP) for gTLD Registration Data and I'm happy to say our group has reached a historic milestone. Just last week, the group published its initial report for public comment. more
Former U.S. presidential candidate and congressman Rob Paul has filed a complaint with the World Intellectual Property Organization against the registrants of RonPaul.com and RonPaul.org in order to gain control of the domains. more
Caixin reports that the State Council, China's cabinet, has set up an office to regulate internet activity, according to an announcement released on May 4 via an official website. The new department, called the State Internet Information Office, will supervise online content management and process approvals of businesses involved in online news reporting, according to the state-run news agency Xinhua. The new agency is reported to have the authority to investigate and punish online content-providers if necessary. more
Parties to a UDRP proceeding must include a certification similar in U.S. practice to Rule 11 of the Federal Rules of Civil Procedure (and undoubtedly a feature in procedural codes in other judicial jurisdictions) "that the information contained in this [Complaint or Response] is to the best of [Complainant's or Respondent's] knowledge complete and accurate, that this [Complaint or Response] is not being presented for any improper purpose, such as to harass... more
A hacking incident over the weekend attacked networks in a number of countries including data centers in Iran where they left the image of a U.S. flag on screens along with a warning: "Don't mess with our elections." more
Trump and his enablers are well known to disrespect if not disdain legal systems, including public international law. He has effectively abrogated every treaty instrument relating to international communications at the whim of a tweet. His behavior has dishonoured the USA in a way that will take years to remedy. Trump's actions to ban access to Android Operating System updates on Chinese products have significantly harmed cybersecurity worldwide. more
The global telecoms industry numbers remain impressive: By 2020 there will be 6 billion mobile subscribers -- of which, according to Nokia, 95% will have access to wireless broadband by 2015, and by 2020, there will also be 3 billion fixed broadband subscribers. However the relevance of these numbers will decline. By 2020 there will be 50 billion fixed and mobile connections. more
On the 25th of September, the northern autonomous region of Iraq known as Kurdistan voted to become an independent country. This vote has led to a current standoff between the central Iraqi government and the Kurdish Regional Government (KRG), with the Kurds threatening to cut off internet service into Iraq in retaliation for any punitive measures inflicted by Baghdad on the KRG. The following analysis was written by Doug Madory of Oracle Dyn after ISIS took control of Mosul, Iraq in 2014. It describes how the internet of Iraq came to be dependent on international connections through telecoms based in Kurdistan. more
The vision of Kenyan ISP Poa! Internet is "to bring internet to every home in Africa." Poa! offers unlimited, uncapped, 4 Mb/s fixed wireless connectivity to homes for 1,500 KSh ($11.64) per month plus a one-time installation fee of 3,500 KSh ($27.16). But wait, there's more. They provide a dual-SSID router, and the home SSID is used by trusted family members, and the open street SSID is for others. Street users get 100 MB of free data each day and are charged 15 KSh ($.16) per GB with no expiry .data if they exceed 100 MB on a given day. more
Hackers breached a Kansas Department of Commerce data system used across multiple states and gained access to more than 5.5 million Social Security Numbers, according to local news sources. more