/ Recently Commented

DNS Abuse Definition: Attributes of Mitigation

A substantial amount of DNS community discussion on the topic of DNS Abuse is focused on defining what is or is not DNS Abuse. The definition adopted by ICANN contracted parties, as well as the DNS Abuse Institute, is straightforward: DNS Abuse is malware, botnets, pharming, phishing, and spam where it's a vehicle for the preceding harms. There is, of course, some fuzziness on the margins, where technical harms are also using content. more

The Irrationality of Deploying IPv6

For the past few decades, there's been a relatively straightforward narrative on the economics behind the IPv6 transition that goes something like this: sooner or later, IPv4 scarcity will drive costs up until they exceed those of deploying IPv6. A competitive market will then make the rational choice and transition to a more efficient mode of production and deploy IPv6. This is textbook economics, and - with the disclaimer that I'm not a trained economist - it appears to be incorrect. more

It’s Time for ICANN to Release a Preliminary Applicant Guidebook

At ICANN's recent virtual meeting, I was fortunate enough to join a panel facilitated by the Brand Registry Group (BRG), an association of organisations promoting the use of brand top-level domains, where we discussed the release of the next round of the generic top-level domain (gTLD) program. The fact that I was participating in a discussion like this is hardly news, as I've been commenting on the policy discussions and debating its role in the digital landscape for years. more

The ITU Strategic Plan: Time to Terminate

In recent times, groups of people gather at the ITU in Geneva and write a "strategic plan" covering the next few years. Indeed, there is a current questionnaire to that effect. It is frozen in a world that existed 30 years ago, and by any measure, surreal and absurd. It needs to be terminated. Here is why. The International Telecommunication Union (ITU) has existed in various forms since 1850 to perform two basic functions. more

The State of the Internet During the Anti-Government Protests in Cuba

On Sunday, July 11, thousands of Cubans, took to the streets in anti-government protests triggered by COVID, the faltering economy, and an overwhelmed healthcare system. In three days, 110 protests took place across the island. The following is a snapshot of an interactive, crowd-sourced map showing the locations of 118 large and small demonstrations (94 reported on the 11th, 14 on the 12th, seven on the 13th and three on the 17th). more

Computing Clouds in Orbit – A Possible Roadmap

Last week, I predicted that much of the Internet and most cloud datacenters would launch into space in the next ten years. Today the only part of the Internet in space is a very small amount of "bent-pipe" access: signals which go from a user to a satellite and bounce back down to a ground station which feeds them into the terrestrial internet where all processing is done and all queries answered by internet-connected servers, many of them in cloud data centers. more

A Simulation of the SpaceX, Amazon, Telesat and OneWeb Broadband Satellite Constellations

Over two years ago, an MIT research group ran a simulation of the low-Earth orbit broadband constellations of OneWeb, SpaceX, and Telesat, and last January they repeated the simulation updating with revised constellation characteristics and adding Amazon's Project Kuiper. They ran the new simulation twice, once using the planned initial deployments of each constellation and a second time using the configuration shown. more

What ICANN Should Do Now to Help Future Applicants of New gTLDs

During ICANN71, the Brand Registry Group (BRG) openly asked potential future applicants what ICANN can do to help prepare them for the next gTLD round. The answer was very clear - commit to opening the next round and provide as much information as possible early on. However, in recent correspondence to the BRG from ICANN Chair, Maarten Botterman, he emphasized that "significant work lies ahead of us: the 2012 Applicant Guidebook must be updated with more than 100 outputs... more

The Importance of Understanding Attacker Target Selection

There's a bit of a debate going on about whether the Kaseya attack exploited a 0-day vulnerability. While that's an interesting question when discussing, say, patch management strategies, I think it's less important to understand attackers' thinking than understand their target selection. In a nutshell, the attackers have outmaneuvered defenders for almost 30 years when it comes to target selection. more

Communities of Things

When I want to go to a website, I just type in the URL, and I'm there. Sure, we had to get a subscription from a service provider and set up our devices, but that was a one-time thing. As we move into a world of many connected devices, it's no longer a one-time thing. Today, creating connected devices and services requires thinking about all the mechanics and networking and onboarding and providers. more

New Innovations in Free Space Optics

I read an article on the Finley Engineering blog that talks about new research with free-space optics. For those not familiar with the term, this means communication gear that communicates directly using light without any wires. The article talks about a Chinese team of scientists who have used light to transmit ultrahigh-definition video signals between high-rise buildings. more

NTIA’s New Broadband Map

The National Telecommunications and Information Administration surprised the broadband industry by issuing a new broadband map for the whole U.S. The map differs in dramatic ways from the FCC's broadband map, which is derived from broadband speeds that are reported by the ISPs in the country. It's commonly understood that the FCC broadband map overstates broadband coverage significantly. The NTIA map draws upon varied sources in an attempt to create a more accurate picture of the availability of broadband. more

3 Strategies for Keeping ICANN and IANA On-Mission and Out of Politics

Over the last year, the ICANN community has been raging on about two issues: the looming IANA transition away from the US government, and how to ensure the organization is accountable to all the Internet's stakeholders. While the issues have run on separate tracks, they both boil down to one question: can ICANN be trusted to be a good steward of the Internet's future? The answer to this question will go a long way in deciding ICANN's future. more

Multistakeholderism Is Working: Even in Exile

I'm happy to report (mostly) positive feedback on my last article that examined how the multistakeholder model tackled, and tackled well, Phase 1 of the review of all Rights Protection Mechanisms. While bad news may sell more clicks, a little good news from time to time also appears to be welcome. Good news also reminds us of how fortunate we are to have a private sector ICANN with a multistakeholder model of policy development... more

Phishing Scams: How to Spot Them and Stop Them

Phishing scams are nothing new in the online security world and show no signs of subsiding. The scam starts when a fraudster sends a communication purporting to originate from a trusted provider and encourages the recipient, often with a conveyed sense of urgency, to click a link. That link leads to a fake site, usually intended to collect confidential login credentials or other personal information. In similar scams, the mail may encourage the recipient to open an attachment loaded with malicious content. more