The conventional wisdom in the world of legacy standards-making is that monolithic standards produce, if not accelerate, better products and services. Conformance, certification, and associated labelling schemes to implement those standards were believed essential to trust. Although competition law seems now evolving in the other direction, regulatory standards-making bodies themselves have been accorded considerable anticompetitive cartel liability protection. more
While in recent years, HTTPS has become integral part of protecting social, political, and economic activities online, widely reported security incidents -- such as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed -- have exposed systemic security vulnerabilities of HTTPS to a global audience. more
In a statement delivered during the ICANN63 in Barcelona, David Redl,
Assistant Secretary of Commerce for Communications and Information (NTIA) said that while the community has greatly improved ICANN's accountability there is still room left for improvements. more
Over the last ten years, Andrew Odlyzko has been writing about a pricing algorithm that would assure reasonable service levels at reasonable prices. If you're going to F2C, you might want to read that brief article or this slightly more complex one to learn (or refresh your sense of) PMP -- Paris Metro Pricing models to deal with network congestion. You'll also get a sense of why throwing bandwidth at the network will not be sufficient. Here's a great article from 1995... more
Researchers at the University of California, Berkeley's School of Information have released a report raising concern over website monitoring practices which appear to be taking advantage of critical loopholes in privacy protection. According to the study, most popular websites in the United States "all share data with their corporate affiliates and allow third parties to collect information directly by using tracking beacons known as 'Web bugs' -- despite the sites' claims that they don't share user data with third parties." more
Seventy-five years ago today, on May 29th, 1934, Egyptian private radio stations fell silent, as the government shut them down in favor of a state monopoly on broadcast communication. Egyptian radio "hackers" (as we would style them today) had, over the course of about fifteen years, developed a burgeoning network of unofficial radio stations... It couldn't last. After two days of official radio silence, on May 31st, official state-sponsored radio stations (run by the Marconi company under special contract) began transmitting a clean slate of government-sanctioned programming, and the brief era of grass-roots Egyptian radio was over... more
The last Australian Internet Governance Forum (auIGF) was held in October 2016 before the annual event was cancelled as part of an auDA review. Three years on and the auIGF replacement – NetThing – was held in Sydney on 28 October 2019, though I was surprised to see that this Australian Internet event no longer had an associated .au domain name, instead choosing to go with NetThing.info. more
The U.S. Department of Agriculture has been measuring computer usage on farms and publishes the results every two years in its Farm Computer Usage and Ownership report. The most recently released report for 2019 was compiled by asking questions to 20,000 farmers. This is a large sample from the more than 2 million farms in the country. more
Federal Communication Commission (FCC) Chairman, Tom Wheeler, today in an open letter in the Wired Magazine writes: "After more than a decade of debate and a record-setting proceeding that attracted nearly 4 million public comments, the time to settle the Net Neutrality question has arrived..." more
Elon Musk is a self-proclaimed "free speech absolutist" which leads some to worry that Twitter will be open to the sort of thing one finds at gab.com if his purchase of the company is completed. I have no idea what Musk plans to do with Twitter but let me offer some optimistic speculation. For a start, I don't believe Musk will use Twitter to advance right-wing candidates or policy. more
"We often refer to the Cuyahoga River in Cleveland that caught on fire over 20 times before we actually did something to introduce the Clean Water Act," says Allan Friedman, the director of cybersecurity initiatives for the Department of Commerce's National Telecommunications and Information Administration (NTIA), in conference call on Monday. more
White House has issued new directive spelling out how the Federal government will coordinate its incident response activities in the event of a large-scale cyber incident. more
A Brazilian judge on Monday issued a 72-hour ban on WhatsApp chat service throughout Brazil. The measure which took effect at 2 p.m. was issued on April 26 following a failed 2013 access order from a branch of civil police that investigates criminal activity online. more
In September 2020, I wrote a post on a proposed 56-kilometer link between the ARCOS undersea cable and the north coast of Cuba, near Havana. The Trump-appointed Justice Department Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector was to conduct a 120-day security review of the proposal. more
ICANN's request for comment on amending the .com registry agreement to restore Verisign's pre-2012 pricing flexibility ended last Friday and, with 8,998 responses submitted by stakeholders, may have been a multistakeholder version of the St. Valentine's Day Massacre. Public interest in .com pricing is understandably high but the sheer volume of responses – nearly three times the number of comments submitted this summer on deregulating .org pricing – also suggests a show of force... more