China's newly released International Strategy on Cyberspace is marked by three distinctive layers with different degree of priority: (1) sovereignty (or cybersecurity, or UN Charter), (2) globalization (or digital economy, or WTO rules), and (3) fundamental freedoms (or human rights, or UDHR). The good point of the strategy is that it tries to make the three layers peacefully co-exist in one document. The failure, however, lies in the intentional ranking of relevance/importance of the three layers... more
The sharing economy is a challenge for local communities. On the good, it creates economic opportunity and reduces the price. On the bad, it circumvents public safety and welfare protection. Such is the clash between Airbnb and local jurisdictions. San Francisco implemented a local ordinance that permits short-term rentals on the condition that the rental property is registered. In order to register the property, the resident must provide proof of liability insurance... more
"In a defeat for digital privacy advocates, the House of Representatives voted Tuesday to allow internet service providers to sell information about consumers’ browsing history without their knowledge or consent," Molly Olmstead reporting in Slate. more
As a member of the ROW Planning Committee, I am writing this post on behalf of the Committee and welcome all community members to join us on June 4th. We are celebrating ROW's 10th anniversary! A decade of collaboration and inspiration! Thank you to the incredible community that has fueled this journey! more
"Outgoing U.S. Federal Communications Commission Chairman Tom Wheeler warned Republicans against dismantling the Obama administration's landmark 'net neutrality' protections," David Shepardson reporting in Reuters. more
The AI Strategy course at UC Berkeley has come to an abrupt end, but formal learnings in AI will continue. I want to thank professors at UC Berkeley, Alberto Todeschini, Ph.D., and Stuart Russell, who developed a comprehensive course to implement AI in business. After three certificates, Alberto has encouraged me to pursue a master's in Artificial Intelligence. My wife and I are contemplating this next step. more
The "Paris Call for Trust and Security in Cyberspace," announced by French President at the Paris Peace Forum on November 13, has attracted more than 450 signatories. more
Final echoes of the US Senate committee's questions of Facebook this week will only fade in the UN Security Council where, in a few years, Member States will adopt a treaty on regulation of the Internet Economy. By opening wide the door to questions on privacy, revenue, security and purpose, Congress showed its well-placed concern and signaled that others can too. more
A few weeks ago, Appdetex published a blog with predictions for 2021, and admittedly, at the date of publication, there were already very clear indications that one prediction was already in flight. In our blog post, we'd said, "With the global domain name system failing to abate abuse, and, in fact, thwarting consumer protection, get ready for a patchwork of local laws targeting attribution and prosecution of bad actors... Get ready for some confusion and turmoil in the world of notice and takedown related to local laws and regulations." more
It was interesting to see that, albeit belatedly, the American media started to stop giving Trump opportunities to spew out his lies across the country and beyond. It obviously had now reached a point where the media realized that if they continued to provide Trump with their avenues, this would make them accomplices in inciting violence. Is this going to be a turning point? more
Home to two-thirds of the world's population and 90 percent of its economic output, the G20 countries are a powerhouse that have yet to take on a coordinated digital agenda. This could be about to change. Under the German presidency of the G20, digital concerns - from getting people connected to protecting people's data once they are - have been made a priority through a new 'Roadmap for Digitalisation'. more
A Chinese law that went into effect six months ago required online service providers to file details of the algorithms they use with China's centralized regulator, the Cyberspace Administration of China (CAC). In mid-August, CAC released a list of 30 algorithms used by companies such as Alibaba, TenCent and Douyin, the Chinese version of Tiktok, with a brief description of their purpose. more
Vint Cerf has posted comments in support of the pending sale of PIR and the .org registry to Ethos Capital. Vint's Comments . Vint is a respected member of the Internet community, and his comments need close attention and careful assessment. Some of his comments have been discussed here earlier. Other comments, posted here and elsewhere, have either supported the sale or raised questions. more
The Internet Society has released an announcement setting out its views on the development of policy to address the balance between security and privacy. From an Internet perspective and in the context of the growing threat vector from hacking, targeted cyber attacks on networks and individuals, and surveillance, the Internet Society's approach to the development of cyber security policy initiatives is based on the following key considerations. more
In a previous blog post I mentioned that the FCC had taken away restrictions to allow broadband supplied by E-Rate funding to be used to provide free WiFi for the public. That's a good idea that will provide some relief for areas with little or no other broadband. But the announcement raises a more fundamental question - why was such a restriction in place to begin with? more