As often occurs in networking and cryptographic history, anecdotes and insularity conspire to mask how developments actually occurred, and seminal roles undertaken by women are forgotten or ignored. One of the notable examples of this proclivity occurred in the cybersecurity cryptology arena as it involves a critical platform known as the Transport Layer Security Protocol (TLS) and the pioneering role of Ruth Nelson. more
A timely article in The Wall Street Journal (that I only recently got around to reading): "The future's not here." American business people once saw China as dynamic, exciting and wide open. Not anymore. To which I ask: When was China ever "wide open?" Let's not blame the recent trade and tariff issues. China is a ruthlessly competitive market that, like so many countries, tilts the playing field in favor of its home-grown companies. more
Everyone knows about Bitcoin. Opinions are divided: it's either a huge bubble, best suited for buying tulip bulbs, or, as one Twitter rather hyperbolically expressed it, "the most important application of cryptography in human history". I personally am in the bubble camp, but I think there's another lesson here, on the difference between science and engineering. Bitcoin and the blockchain are interesting ideas that escaped the laboratory without proper engineering - and it shows. Let's start with the upside. more
One year ago, in late 2017, much of the policy debate in the telecommunications sector was raised to a fever pitch over the vexed on-again off-again question of Net Neutrality in the United States. It seemed as it the process of determination of national communications policy had become a spectator sport, replete with commentators who lauded our champions and demonized their opponents. more
One of the chronic features of the Bitcoin landscape is that Bitcoin exchanges screw up and fail, starting with Mt. Gox. There's nothing conceptually very hard about running an exchange, so what's the problem? The first problem is that Bitcoin and other blockchains are by design completely unforgiving. If there is a bug in your software which lets people steal coins, too bad, nothing to be done. more
What says the "Crystal Ball" for the Internet Governance Ecosystem in 2019? In a best case scenario, we will take three steps to Cyber-Heaven. In the worst case scenario we will take three steps to Cyber-Hell. The middle way is no "digital big bang", but some small "digital goodies" and some small "digital disasters". Stumbling further forward into the digital cyberworld. However, 2019 could also go into the history books as the year of "digital wisdom". more
Once a month, at the end of the month, a snapshot of domain name registration volumes is taken according to categories of new gTLDs. Twenty categories are covered and this article covers Political new gTLDs. These snapshots allow having a global overview of which extensions increase their volume of domain names registered from a month to the other, in a period of 12 months. Below is what I noticed from January 2018 to December 2018 for domain name extensions related to politics. more
When properly used, the UDRP enables trademark owners to take control of abusive domain names. Yet sometimes the UDRP itself is misused by trademark owners to try to seize desirable domain names to which they have no legal entitlement. Is there a downside to misusing the UDRP to attempt a domain name hijacking? Unscrupulous companies at times misuse the UDRP by improperly invoking its power to compel a transfer of ownership in order to seize inherently valuable, non-infringing domain names that the companies desire for their own use. more
The weighing of evidence involves the connecting of dots, which involves drawing inferences. However, just as there can be false positives, there can be false inferences. The tendency may be to think of inferences as coming in one size, but not all inferences are logically correct. Some are weak and others strong. The reason for talking about both kinds is that so much depends on the quality of their making. more
The 2013 NSA revelations by the American whistleblower Edward Snowden was a stern wake call for French politicians. more
Millions of email warnings were sent out by Marriot on Friday to warn customers about the massive data breach which has affected close to half a billion guest data. more
Hackers behind the massive data breach of the hotel group Marriott International Inc have left clues suggesting ties to the Chinese government intelligence-gathering operation. more
Over the past few years, the term "open internet" has become popular among politicians in Washington and Europe. It is bandied about in political pronouncements that assert that everyone needs to somehow support the open internet without ever actually defining it. It is sometimes used as a synonym for Net Neutrality. In fact, it is a bogus public relations term that is rather like saying you believe in the Tooth Fairy. more
Several weeks ago, the White House published a document asserting that "America Will Win the Global Race to 5G." The White House should get over it. This is not about America winning any global race to 5G, but the world working together on fundamentally different, complex, new communication networks and services. There are four important points, however. more
Forty five what? Forty five abandoned top-level domains. On November 7, ICANN received a notice from the Communication Regulatory Authority of the State of Qatar that they are terminating the registration agreement for .DOHA. Two weeks before that, the Zadco company terminated .ZIPPO. In addition to the $180,000 application fee, applicants had to hire consultants, make arrangements with back-end operators, go through the certification process to get their TLD online. more