As the world races towards digital transformation, the technologies we choose will have a lasting impact on our planet. Blockchain, NFTs, and other crypto assets have garnered much attention for their ability to securely and immutably store records. However, the environmental cost of maintaining these technologies is often overlooked. The energy consumption required to sustain blockchains, particularly those using Proof of Work (PoW), is enormous... more
Stephen Shankland reporting in CNET: "In a new effort to bring Internet access to the world's billions, Google, US and UK government organizations, and a raft of high-tech partners on Monday announced the Alliance for Affordable Internet..." more
The Internet Society - New York Chapter (ISOC-NY) has for some years been following the .nyc and ICANN process on behalf of the NYC community and will, on May 8 2010, host a symposium "dot nyc - How are we doing?" at NYU. At 1pm NYC Council Member Gale Brewer will deliver keynote remarks, then Vendor Eric Brunner-Williams of CORE Internet Council of Registrars will reveal details of their proposal to the City, and Antony Van Couvering of Minds + Machines earlier comments to the City Council concerning their proposal will be shown in video. ...there will be a discussion "What's it for?" about possible applications - civic, community, commercial, and "outside the box" - for a local top level domain. more
In 2019, two organisations - Public.Resource.org of Sebastopol, California, and the Right to Know GLC of Dublin - brought suit against the European Commission for violating the fundamental rights of citizens to access the standards they are required by law to know, and attempting to protect intellectual property by copyright which lacked originality because it was, inter alia, provided by public governmental and industry sources. more
Jim Cowie of Renesys reports: Traffic interception has certainly been a hot topic in 2013. The world has been focused on interception carried out the old fashioned way, by getting into the right buildings and listening to the right cables. But there's actually been a significant uptick this year in a completely different kind of attack. more
There's been a lot of controversy over the U.S. Government's proposal to give up their supervisory role over ICANN. This lead Karl Auerbach, one of the only people ever elected to represent end-users in cyberspace, to write this letter to Congress. Karl did an excellent job as North America's first elected representative in cyberspace. He fought for things that would have made Internet governance more representative, and more transparent. more
In a blog post by Google's Sitaram Iyer, Staff Software Engineer, and Matt Cutts, Principal Engineer, a "secret project" has been revealed in an effort where the company is aiming to enhance various key aspects of its web search technology including indexing speed, accuracy, and comprehensiveness. The company so far has released the new engine "under the hood," for testing and feedback only and says most users will not notice a difference in search results. more
An open letter from nearly 150 individual and organizational members of ICANN's Non-Commercial Users Constituency (NCUC) has been submitted to ICANN's board of directors and CEO. The letter has expresses serious concern over a recent ICANN Board decision regarding the restructuring of the Generic Names Supporting Organization (GNSO). From the letter: "We believe that the Noncommercial Stakeholder Group (NCSG) chartering process has been seriously flawed on both procedural and substantive grounds. We appeal to you to address these problems before permanent damage is done to ICANN's reputation, to the GNSO reform process, and to the interests of noncommercial users of the Internet." more
It's often a clear signal that we're in deep trouble when politicians believe they need to lend a hand and help out with regulations. A bill has been passed by the US Congress, and now signed into law, that requires the National Institute of Science and Technology to work with other agencies in developing guidelines for the use of devices that manage security vulnerabilities, patching, together with configuration and identity management. more
Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more
The United States White House Office of Science and Technology Policy (OSTP) has released a new report titled, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, specifying an agenda for "game-changing" cybersecurity R&D according to an official announcement today. The report is described as "a roadmap to ensuring long-term reliability and trustworthiness of the digital communications network that is increasingly at the heart of American economic growth and global competitiveness." more
No, this topic hasn't yet been exhausted: There's still plenty more conversation we can and should have about the proposed sale of the .ORG registry operator to a private firm. Ideally, that conversation will add more information and more clarity about the issues at stake and the facts that underpin those issues. That's why I'm planning to attend today's event at American University where the sale's proponents, opponents and undecideds will have a tremendous opportunity to better understand one another. more
Ministry of Foreign Affairs and the Cyberspace Administration of China has jointly released a document titled "International Strategy of Cooperation on Cyberspace." more
This week in Japan I have been invited to address the Multi-Stakeholder Conference that will officially open the G7 ICT Ministerial summit in Takamatsu. The focus of the ICT Ministerial will be on four distinct areas: (1) Innovation and economic growth; (2) Unrestricted flow of information, and ensuring the safety and security in cyberspace;
(3) Contributing to the resolution of global issues, including digital connectivity; (4) International understanding and international cooperation in the future. more
To prepare DNS security for a post-quantum future, Verisign and partners are testing new cryptographic strategies that balance security, performance, and feasibility, especially through the novel Merkle Tree Ladder mode for managing large signatures. more