A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more
It seems that this last holiday season didn't bring much cheer or goodwill to corporate security teams. With the public disclosure of remotely exploitable vulnerabilities and backdoors in the products of several well-known security vendors, many corporate security teams spent a great deal of time yanking cables, adding new firewall rules, and monitoring their networks with extra vigilance. more
Decentralization is a big trend in IT, and everyone has their own definition of what "decentralization" really means. With more organizations fully embracing a work-from-anywhere culture, decentralization has moved past being a fad and turned into a necessity. Decentralized cybersecurity is nothing new. Many of us have been doing it since before the pandemic. more
Researchers have been able to successfully demonstrate a commercial aircraft can be remotely hacked. more
On many occasions I have written about the dangers of electronic communications in relation to data retention laws, government e-spying and other activities undermining our democracy and our liberty. To date governments still have to come up with evidence that all of this spying on their citizens has prevented any terrorist attacks. Terrorism has been given as the key reason for the government's spying. more
In my last post, I looked at what happens when a DNS query renders a "negative" response -- i.e., when a domain name doesn't exist. I then examined two cryptographic approaches to handling negative responses: NSEC and NSEC3. In this post, I will examine a third approach, NSEC5, and a related concept that protects client information, tokenized queries. The concepts I discuss below are topics we've studied in our long-term research program as we evaluate new technologies. more
The Uniform Domain Name Dispute Resolution Policy (UDRP) limits parties' submissions to complaints and responses; accepting "further statements or documents" is discretionary with the Panel (Rule 12, Procedural Orders), although the Forum (in Supplemental Rule 7) but not WIPO provides for supplementing the record with the proviso that "[a]dditional submissions must not amend the Complaint or Response." For some panelists, Rule 7 contradicts the Policy. more
For over four days, a crucial server within the Internet's domain name system (DNS) experienced an unexplained glitch, causing it to fall out of sync with its 12 peer root servers. The server, operated by Cogent Communications, is one of the 13 essential root servers that manage the Internet's root zone. more
Big tech's ownership of the internet backbone will have far-reaching, yet familiar, implications, says Tyler Cooper, a broadband policy watcher, and editor at BroadbandNow. more
Measuring the performance of broadband networks is an important area of research, and efforts to characterize the performance of these networks continues to evolve. Measurement efforts to date have largely relied on inĀhome devices and are primarily designed to characterize access network performance. Yet, a user's experience also relies on factors that lie upstream of ISP access networks, which is why measuring interconnection is so important. more
U.S. Subcommittee on Communications & Technology and the Subcommittee on Commerce, Manufacturing, and Trade have announced a joint hearing to examine recent cyberattacks. more
New gTLD Applicants now have a more fair and reasonable ICANN auction framework. A collaborative negotiation between the New TLD Applicant Group (NTAG) Auctions Working Group and ICANN Staff resulted in changes that improve the auction rules and bidder agreement. The indemnification and waivers in the agreement are now aligned with breaches that applicants can control. Applicants also now have an indemnification from Power Auction for third party claims related to IP infringement. more
"Internet freedom has declined for the sixth consecutive year, with more governments than ever before targeting social media and communication apps as a means of halting the rapid dissemination of information, particularly during antigovernment protests," according to the Freedom on the Net 2016 report released by Freedom House. more
I work with a lot of ISPs that own rural fiber. Some rural network owners have been successful in providing fiber to cell sites near their networks over the last decade. A few sell directly to a cellular carrier, but most of these connections are sold to an intermediate carrier that bundles together cellular connections across a large geographic area. more
When a tax is too high people avoid it, and when the political cost of supporting the US government becomes too high, foreign governments will avoid it too. Add to that cost America's new inclination to withdrawal, and consider the muddy tidal flat on which could soon list the hull of what used to be American technological primacy... When countries try to develop technology policies to compete with the United States, they often begin with rules over immigration. more