/ Recently Commented

Network Neutrality, UPS, and FedEx

I buy a lot of things that are delivered by UPS or FedEx. And I kinda like to watch the progress of the shipments. Now we all know that UPS and FedEx have different grades of service -- Overnight, Two Day, Three Day, etc. And faster deliver costs more. Several years ago UPS and FedEx would frequently deliver a Two Day package the next day, i.e. they would effectively elevate the class of service. more

IPv6: A Lost Decade?

A 'decade from hell', according to Times Magazine, a 'dazing decade' says Newsweek. In Copenhagen, at the Climate Change Conference, the World Meteorological Organization talked of the 'hottest decade on record'. BusinessWeek characterized the decade as one of 'innovation interrupted'. All this gloom made me wonder how to qualify our IPv6 decade? more

End of Domain Name Auction Sites

Having eBay has worked out pretty well for the world at large; now it's time for the world of domain names to start using it. We need to throw away the jumble of different auctions and dealer sites. Speculators may not like having their haunts cleaned out, but corporate (end-user) buyers and investors will welcome the chance to deal with one centralized auction mechanism with one set of rules. more

A Look Inside the European Response to Spam

Last week the European Network and Information Security Agency (ENISA), which assists the European Commission and its member states with network and information security issues, published its third Anti-Spam Measures Survey. The survey provides insight into how network operators in Europe are responding to the continued onslaught of email spam. more

What Makes a Good ESP?

There are a number of things that make a responsible Email Service Provider (ESP), including setting and enforcing standards higher than those set by the ISPs. One of the responsible ESPs is Mailchimp. (Full disclaimer, I do consult for Mailchimp.) This ESP focuses on businesses with small to medium sized lists. They screen new customers for source of permission as well as mail content. more

Malware and Botnet Operators Setting Up Their Own Data Centers

Dennis Fisher of Thread Post reports: "The malware writers and criminals who run botnets for years have been using shared hosting platforms and so-called bulletproof hosting providers as bases of operations for their online crimes. But, as law enforcement agencies and security experts have moved to take these providers offline, the criminals have taken the next step and begun setting up their own virtual data centers." more

Berlin the Latest New TLD Battleground?

If you've been following the new Top-Level Domain (TLD) process within ICANN over the last year or so you will have probably been aware of how slow and tortuous development has been. To recap, ICANN, which oversees domain names globally, announced that it was "opening up" the internet so that "anyone" could get the domain extension they wanted. Of course it's not really "everyone" and the process to date has been far from smooth. more

You Don’t Need to Hack Twitter.com to Control All Its Traffic and Email

A big security news event last night and today is that the Twitter.com Web site was hacked and content on the site replaced. TechCrunch reported it and it has been picked up globally. But - was the Twitter.com website really hacked? We now know it was not so. There are four ways that users typing in Twitter.com would have seen the Iranian Cyber Army page. more

FiOS: A Reality Check

I wrote this in response to some interest in my experience with the reality of FiOS. The short summary is that there is no magic. Sure having Fiber is nice but it isn't that much different than my "cable" service. The bigger difference between Comcast and Verizon is in the nature of the businesses. Comcast is a content company trying to move on to it looks beyond the STB with its purchase of NBCU whereas Verizon seems to want to continue the 1990's vision of the STB as its entrĂ©e into the home. more

Bridging the Gaps: MAAWG, IETF, and BITS Establish Formal Relationships

As announced this morning, the Messaging Anti-Abuse Working Group (MAAWG) has established formal relationships with the Internet Engineering Task Force (IETF) and the BITS/Financial Services Roundtable... It's often said that there are too many different organizations working on the overlapping areas of abuse, trust, and related issues. I believe the collaborative approach MAAWG has chosen will bridge these gaps. more

ISPs Are Speaking, Is Anyone Listening?

Lately I've been seeing and hearing a lot of quiet warning noises coming from ISPs and spam filtering companies about sender behaviour. I believe they're forecasting changes in how ISPs treat commercial email and what new issues senders are going to have to negotiate. The short version is that commercial mail is a mixed bag. more

China Tightens Internet Control in the Name of Fighting Porn, Piracy, and Cybercrime

As the year draws to a close, China's blocking of overseas websites - including Facebook, Twitter, and thousands of other websites including my blog - is more extensive and technically more sophisticated than ever. Controls over domestic content have also been tightening. People who work for Chinese Internet companies continue to complain that they remain under heavy pressure... more

The Real Face of Cyberwar?

Anyone who reads the papers sees stories -- or hype -- about cyberwarfare. Can it happen? Has it already happened, in Estonia or Georgia? There has even been a Rand Corporation study on cyberwarfare and cyberdeterrence. I wonder, though, if real cyberwarfare might be more subtle -- perhaps a "cyber cold war"? more

.google Before Christmas

I'm a real fan of the Google Masterplan since its publication in 2005. After the introduction of its own global DNS I thought it might be a good idea to have a second look on the G-Masterplan. What I found is astonishing and shows the steps to .google. more

Dr. Peering Commits Malpractice on Net Neutrality

At Tier1 Research, we hate to call out individuals for wrongdoing, but once in a while, it's absolutely necessary. At the moment, the Federal Communications Commission (FCC) is in the middle of the rulemaking process for network neutrality, a complex endeavor. While Tier1 is against interference from regulators as a concept, the proposed rulemaking document from the FCC, while vague, is not completely unreasonable... more