/ Recently Commented

Why DNS Is Broken, Part 1: Trust

So this Internet thing, as we discussed in our last article, is broken. I promised to detail some of the specific things that are broken. Implicit trust is the Achilles heel of the Internet... All of the communication between the resolver and the DNS server is in plain text that can be easily seen and changed while in transit, further, the resolver completely trusts the answer that was returned... more

Sweden’s Internet Traffic Drops by a Third as New Anti-Piracy Law Kicks In

April 1st was the start of a new anti-piracy law in Sweden where, according to traffic data, an immediate and significant drop (over 30%) occurred in the nation's overall Internet traffic. Reported today by Royal Pingdom: "The combined traffic passing through Sweden's Internet Exchange Points usually peaks around 160 Gbit/s, but on Wednesday it peaked at around 110 Gbit/s. That's a huge drop in traffic, and is presumably a direct result of less file sharing taking place. ... Another interesting observation is that there was more traffic than usual during the last days before the law took effect. Were people hoarding films and music? On Tuesday (the day before the law went live) traffic peaked at nearly 200 GBit/s, roughly 25% above normal levels." more

Comments on ICANN’s Studies on New Proposed TLDs

I outline some general critical comments on the recent commissioned reports for ICANN's proposed introduction of new top-level domain names (TLDs)... The reports cite seminal papers in economics, but the papers' applicability here is dubious. For example, for economists a "good" is a product intended for consumption, which is a different sort of animal than a financial investment. more

ICANN’s Economic Reports: Finding the Missing Pieces to the Puzzle

The ICANN community has been especially concerned about the economic reports used by ICANN to justify its decisions as to whether, and how, to implement applications for new gTLDs. Among the greatest sources of concern has been the failure of ICANN staff to issue a complete public response to the ICANN Board's October 2006 demand that ICANN Staff commission economic studies about gTLDs... more

Connecting Clouds

History is littered with manifestos, the public statements of principles and intentions that announce policies, revolutions or ambitious visions in politics and the arts... And now we have a new manifesto for the modern age of distributed computing. The ‘open computing manifesto’ was launched this week with the support of some very large computer companies including Cisco, AT&T, Sun Microsystems and Telefonica as well as over fifty other players in this growing market, all under the leadership of IBM. more

Asia, Europe Top the Charts on Conficker Worm Infections

Amidst hype and anticipation of the Conficker worm which is expected to become active in millions of Windows system within the next few hours, IBM Internet Security Systems team reports they have been able to locate infected systems across the world by reverse-engineering the communications mechanisms. Holly Stewart, X-Force Product Manager at IBM Internet Security Systems, writes: "... the details are still unfolding, but we can tell you from a high level where most infections are as of today. Asia tops the charts so far. By this morning, it represented nearly 45% of all of the infections from our view. Europe was second at 31%. The rest of the geographies held a much smaller percentage overall." more

The Jaynes Case is Finally Over

Last September the Virginia Supreme Court issued a surprise ruling that reversed its previous decision and threw out the state’s anti-spam law on First Amendment grounds. The Commonwealth made a last ditch appeal to the US Supreme Court, which I predicted they’d be unlikely to accept. I guessed right... more

Project GhostNet: Canada (and Google) Save the World from Cyber-Spying - Again!

While most people I know are at either VoiceCon or CTIA this week, this one is worth staying home for. Also, I'm sure all the Skype followers are focused today on the news about working with the iPhone -- and that IS a big story. However -- for very different reasons -- I'm sure you'll find this one of interest too. This was a front page story in today's Globe and Mail, and no doubt many other Canadian dailies... more

Security Researchers Uncover Cyber Espionage Network Invloving 103 Countries

A report released over the weekend by Information Warfare Monitor along with an exclusive story by the New York Times, revealed a 10-month investigation of a suspected cyber espionage network (dubbed GhostNet) of over 1,295 infected computers in 103 countries. 30% of the infected computers are labeled as high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs. Greg Walton, editor of Information Warfare Monitor and a member of the Toronto academic research team that is reporting on the spying operation, writes... more

Cloud Computing on Linux Has Microsoft Blogging

The Cloud Manifesto, a collaborative document prepared jointly by Amazon, Google, IBM and others has apparently upset Microsoft. In a blog post entitled "Moving Toward an Open Process on Cloud Computing Interoperability" and penned by the senior director of developer platform management for Microsoft, Steven Martin, Mr. Martin stated his position that the Cloud Manifesto and the process of creating it was biased to benefit its authors, and unfair to their competitors – such as Microsoft... more

Internet Records Retention Bill

A lot of pixels have been spilled lately over an Internet records retention bill recently introduced in both the House and the Senate. The goal is to fight child pornography. That's a worthwhile goal; however, I think these bills will do little to further it. Worse yet, I think that at least two of the provisions of the bill are likely to have bad side effects... more

Europe’s Mobile Operators Running Dumb Pipes for Revenue

In most of Europe, mobile network operators (MNOs) have largely completed their 3G network roll outs. During the last year or two their focus has been on upgrading these networks with new technologies, including femtocell and, importantly, HSPA. Following trials expected to be held during 2010, LTE will soon be sufficiently advanced for commercial launches. This will provide significant opportunities for Europe's market for convergent services, adding a new platform for delivering a range of media... more

Searching for Truth in DKIM: Part 5 of 5

Throughout this series of articles we've been talking about DKIM, and what a valid DKIM signature actually means. .. What this means for senders (of any type) is that with DKIM, you’re protected. On the internet, your domain name is a statement of your brand identity – so by signing messages with DKIM, you can finally, irrevocably tie those messages to your brand. more

DNS Insecurity

The Internet as we know it and use it today -- is broken, badly broken. Yes broken so much so that we are really crazy to have any expectations of privacy or security. Yes, really. The Internet was conceived as somewhat of a utopian environment, one where we all keep our doors, windows and cars unlocked and we trust all the people and machines out there to "do the right thing...". more

Will ENUM Deliver?

ENUM (E.164 NUmber Mapping) is a technology that has been around for a little while that has promised much and, so far, delivered little to the average user. As Nominet has recently been awarded the contract to administer the UK 4.4.e164.arpa delegation, I thought it was time that I put my thoughts on this subject down in writing. I'm going to cover the potential of ENUM in the telecoms industry and what it could mean to you, along with how it is currently being used and what potential security issues surround ENUM. more