As you probably know, the FBI has gotten into Syed Farook's iPhone. Many people have asked the obvious questions: how did the FBI do it, will they tell Apple, did they find anything useful, etc.? I think there are deeper questions that really get to the full import of the break. How expensive is the attack? Security - and by extension, insecurity - are not absolutes. Rather, they're only meaningful concepts if they include some notion of the cost of an attack. more
WikiLeaks shook the internet again on March 7, 2017, by posting several thousand documents containing information about the tools the CIA allegedly used to hack, among others, Android and iOS devices. These classified files were obtained from the CIA's Center for Cyber Intelligence, although they haven't yet been verified and a CIA official declined to comment on this incident. This isn't the first time that the U.S. government agencies were accused of crossing the line and undermining online security and civil liberties, as it's been only a year since the infamous FBI-Apple encryption dispute. It's like "1984" all over again. more
Privacy problems are an area of wide concern for individual users of the Internet -- but what about network operators? Geoff Huston wrote an article earlier this year concerning privacy in DNS and the various attempts to make DNS private on the part of the IETF -- the result can be summarized with this long, but entertaining, quote. more
China's home grown firms are not only grabbing domestic businesses but also venturing to different countries across the world. On the other hand, foreign players face regulatory walls that make it difficult to tap businesses in China." Saibal Dasgupta reporting today in VOA more
When the scale of global surveillance carried out by the NSA (USA) and by the GCHQ (UK) was exposed by Edward Snowden through The Guardian, people around the world were shocked to discover how two established democracies routinely resort to methods that they have long deplored -- and rightly so -- in dictatorships, theocracies and other single-party arrangements. In a previous article, I lamented the fact that by carrying out this surveillance on an unprecedented scale, the US and the UK are, in fact, converging with the very regimes they criticize. more
It is rather amazing to follow the reporting on the FBI vs Apple case in relation to the FBI's order to Apple to provide them with software that would allow them to crack the security code on all Apple phones. In some of those reports spin doctoring from the FBI -- especially through the public media -- led you to believe that Apple is not willing to assist the FBI in the San Bernardino murder case. This is, however, blatantly false. more
As opposition grows against the Government's controversial plan to censor the internet, the head of one of Australia's largest ISPs has labeled the Communications Minister the worst we've had in the past 15 years. Despite significant opposition from internet providers, consumers, engineers, network administrators and online rights activists, the Government is pressing ahead with its election promise of protecting people from unwanted material, this week calling for expressions of interests from ISPs keen to participate in live trials of the proposed internet filtering system. Michael Malone, head of iiNet, Australia's largest ISP, said he would sign up to be involved in the "ridiculous" trials, just to show how impractical it is. more
Digital Civil Rights in Europe reports: "During an investors day on 10 May 2011 in London, Dutch Internet service provider KPN admitted to using deep packet inspection (DPI) technology, to determine the use of certain applications by its mobile internet customers. Vodafone soon followed with an announcement that it used this technology for traffic shaping. The Dutch minister of Economic Affairs within days announced an investigation into KPN's practices and promised to publish the results within two weeks." more
"The digital information ecosystem farms people for their attention, ideas and data in exchange for so called 'free' services," says Giovanni Buttarelli, the European data protection supervisor. more
Turkey's Parliament has passed a bill that includes controversial arrangements concerning the protection of online privacy despite concerns raised by the European Union as well as Turkish NGOs and opposition parties, according to a report today by Turkey's Daily News. more
Here in the United States, we recently celebrated Thanksgiving and with that, we now enter the last weeks of 2018. I've spent much of this past year involved in ICANN's Expedited Policy Development Process (EPDP) for gTLD Registration Data and I'm happy to say our group has reached a historic milestone. Just last week, the group published its initial report for public comment. more
The smartphone has effectively transformed us into cyborgs, we have in our hands a highly efficient computing device equipped with a photo and video camera, microphone, GPS, accelerometer, gyroscope, magnetometer, light and proximity sensors, as well as other features that allow creation of increasingly useful, impressive and addictive applications. more
This isn't the blog post I had hoped to write. When I signed up to participate in ICANN's Expedited Policy Development Process for gTLD Registration Data, I knew we had a lot of work ahead of us, but I was cautiously optimistic that we would, eventually, reach a successful outcome. Today, I find myself looking at things differently. After hundreds of hours and countless meetings and emails, Phase 2 of the EPDP's work has wrapped up with the delivery of our final report to the GNSO Council. more
There is currently a heated discussion going on in Europe, and particularly here in Germany, about the use of COVID-19 digital tracing apps, a discussion that shows us how much the Internet has become a matter of life and death. The uses for such apps are undeniable, but the idea of deployment still meets with popular resistance. Sensitized by countless leaks and hacks, and chafing under restrictions in their freedom of movement, people are concerned that even the last zones of privacy are to be monitored, and that the personal data collected could be misused. more
Following a very successful series of workshops held during IETF meetings, the next Registration Operations Workshop (ROW) is now being held during the upcoming ICANN meeting in Hyderabad, India. While the previous workshops were of advanced topics attended by industry experts, the current one will be more of a tutorial and is open to all interested parties. more