In Part One of this series, we examined internal server, network and infrastructure monitoring applications. Now let's take a look at another way to capture DDoS information: external performance monitoring... Unlike network/infrastructure tools - which are usually installed inside a customer's network - external performance monitoring solutions are typically provided by a third party and leverage monitoring locations from around the world. more
A recent study reveals a browser history detection method, largely dismissed as an issue with minimal impact, can in fact be used against a vast majority of Internet users with significant malicious potential. Researchers, Artur Janc and Lukasz Olejnik, analyzed real-world results obtained from 271,576 Internet users and have reported the results in a paper titled, "Feasibility and Real-World Implications of Web Browser History Detection". more
We are at an inflection point in our lifetimes. The Internet is broken, seriously broken... Almost all of the systems currently in use on the Internet are based on implicit trust. This has to change. The problem is that these systems are so embedded in our everyday lives that it would be, sort of like, changing gravity, very difficult. more
Paul Sloan reporting in CNET: "ICANN tomorrow will reveal who is going after what new domain extensions, paving the way for a very different looking Web. Prepare for dot-madness... It's not just the hard-core denizens of the domain world that are going after new TLDs, which are also known as 'strings.' Others are jumping into the fray. The most intriguing is Google, which in late May revealed that it's applying for an undisclosed number of strings, including .Google, .YouTube, .docs, and .lol..." more
France has put an end to its most extreme measure of its notorious "three strikes" anti-piracy law. "Getting rid of the cut-offs and those damned winged elephants is a good thing. They're very costly," Joe McNamee, of European Digital Rights. more
This move will allow the company to separate its call routing services for telecom carriers from its marketing and security related services. Additionally the company has indicated that the latter unit, that is marketing, security, and data services, will be rebranded. more
Is the United States in full retreat from internationally recognized regulatory best practice? Or is it instead headed toward some different destination -- "dancing to the beat of a different drummer"? Where is this likely to lead? The following is an introduction to a paper, published by IDATE, from J. Scott Marcus, a Senior Consultant for WIK-Consult GmbH: "...What has radically changed is telecoms regulatory practice in the United States. The U.S., in a long series of regulatory decisions, has largely abandoned its long-standing regulatory principles and moved in an entirely new direction." more
ICANN has appointed IID President and CTO Rod Rasmussen to its Security and Stability Advisory Committee (SSAC). An area that Rasmussen's work and recent SSAC reports have both covered in-depth is domain name hijacking. Recent hijackings against UFC.com and Coach.com, and similar past attacks against CheckFree, Comcast and Twitter have heightened awareness about the security dangers with the Internet's infrastructure. more
CENTR is the Council of European National Top Level Domain Registries, gathering more than 50 registries such as DENIC for Germany (.de), Nominet for the United Kingdom (.uk) or Switch for Switzerland (.ch). The election took place during CENTR's General Assembly held in Warsaw on February 25 and 26. Mathieu Weill, AFNIC's CEO, replaces Andrzej Bartosiewicz, from the Polish registry, NASK, whose term was coming to an end. more
Every time there is a tragic attack on people or property, there is a cry from various authorities or politicians for law enforcement to get unfettered access to all kinds of communication tools. But that would cause far more harm than good, and is a really bad idea. The argument goes something like this: 'These bad actors hide behind encrypted communications to plan their evil deeds...' more
In its first report on the use of "geosocial" or location-based services, the Pew Research Center's Internet & American Life project finds that 4% of online adults use a service such as Foursquare or Gowalla that allows them to share their location with friends and to find others who are nearby. On any given day, 1% of internet users are using these services. more
We've received enough interest about our previous notes on Iranian Internet connectivity that I wanted to give a brief update, and some reflections. In short: Iran is still on the Internet. As the crisis deepens, people are literally risking their lives by continuing to use the Internet for coordination and communication. more
On February 11th, Professor Ben Leff of American University Washington College of Law (WCL) spoke on the panel: The Controversial Sale of the .ORG Registry: The Conversation We Should be Having as a scholar of charitable and nonprofit law. On February 21st, he posted a blog piece on WCL's PIJIP blog outlining and expanding his presentation. With Professor Leff's permission, I repost his piece on CircleID to join the timely discussion taking place here on the .ORG sale. more
Participant Jean Guillon submits the following text about a new website gTLD.club which is focused on new generic Top-Level Domains. more
Craig Labovitz reporting from Arbor Networks: "We use ATLAS data to graph Facebook (AS32934) traffic with 80 ISPs around the world between 5pm September 22 and 5pm EDT today. You can see Facebook traffic plummet around 1:30pm and return shortly after 4pm. From a quick glance at the data, the outage appears to be global (impacting most of the 80 ISPs)." more