/ Recently Commented

Getting Ready for the Metaverse

In a recent article in LightReading, Mike Dano quotes Dan Rampton of Meta as saying that the immersive metaverse experience is going to require a customer latency between 10 and 20 milliseconds. The quote came from a Wireless Infrastructure Association Connect (WIAC) trade show presentation. Dano says the presentation was aimed at big players like American Tower and DigitalBridge, which are investing heavily in major data centers. more

Cyber Diplomacy History at Foggy Bottom: The Latest Chapter

Foggy Bottom is the local affectionate name for the U.S. State Department -- because of its location near a former low-lying Potomac River lagoon in Washington DC. It recently announced the appointment of Nate Fick as the head of its "Bureau of Cyberspace and Digital Policy," pending Congressional approval because it is wrapped up with ambassadorial status. The term "cyber" in this international diplomacy context has come to include all manner of electronic communication and information systems and services, i.e., ICT. more

The UDRP “Celebrates” Its 500th Reverse Domain Name Hijacking Case

Today, for the 500th time, an expert panel under the Uniform Domain Name Dispute Resolution Policy or "UDRP", issued a decision finding a Complainant guilty of Reverse Domain Name Hijacking or "RDNH". RDNH is an attempt to egregiously misuse the UDRP to unjustly seize a domain name from its lawful owner... To-date, the UDRP has adjudicated over 80,000 domain name disputes. The vast majority of them result in the transfer of a cybersquatted domain name to the rightful trademark owner. more

More Mysterious DNS Root Query Traffic from a Large Cloud/DNS Operator

With so much traffic on the global internet day after day, it's not always easy to spot the occasional irregularity. After all, there are numerous layers of complexity that go into the serving of webpages, with multiple companies, agencies and organizations each playing a role. That's why when something does catch our attention, it's important that the various entities work together to explore the cause and, more importantly... more

CIDR in Networking: Improved IP Routing Efficiency

CIDR (Classless Inter-Domain Routing) is a routing system in which network engineers can distribute IP addresses based on the size of their specific network. This is more efficient than the previous system, which assigned IP addresses depending on whether the size of a network fits into one of only three sizes: Class A, Class B, and Class C. more

Do You See What I See? Geotargeting in Brand Infringements

Geotargeting is a well-established online technique for delivering tailored web content based on a user's geographic location. From an internet technology point of view, this is usually based on the user's IP address, which is converted to a physical location through a standard look-up process performed by network infrastructure. Geotargeting is commonly used by websites for several legitimate reasons, including providing users with relevant advertising and other content... more

World Economic Forum Davos 2022: War in Ukraine, Metaverse und Splinternet

The war in Ukraine, Metaverse and Splinternet were among the most discussed items during the recent World Economic Forum (WEF) in Davos. The topic of cyber security was primarily about the role of cyberattacks in the Ukraine war. Cyber is not the focus of day-to-day public war reporting but is an integral part of warfare on both sides. This applies above all to the use of "social media." more

Putin’s Iron Firewall Is Porous

In 1946 Winston Churchill declared that Russia had lowered an iron curtain across Europe, and in 2022 Vladimir Putin created an iron firewall between the Russian Internet and media and the rest of the world, but, like its precursor, it is porous. Information wants to be free. more

Branded Domains Are the Focal Point of Many Phishing Attacks

As a long-established online attack strategy, phishing remains a popular tool for fraudsters because of its effectiveness. The Anti-Phishing Working Group reported more than 300,000 distinct phishing attacks in December 2021 -- more than three times the number reported in early 2020, and the highest monthly total ever identified. more

Broadband for Communities

When talking about the benefits of broadband, it's easy to overlook how broadband has become the glue that brings people and communities together. This is becoming particularly important for rural communities but matters to people everywhere. Rural communities have been rapidly losing other forms of media that were the focal point in the past. 2004 was the peak of the newspaper business in terms of readership and revenues. more

Securing Weak Links in Supply Chain Attacks

We've all heard the term, "you're only as strong as your weakest link." Whether talking about a tug of war on the playground, a sports team, or a business, this rings as true as ever. Every business relies on a series of suppliers and vendors -- be it the dairy farm supplying milk to the multinational food manufacturer or the payment systems that retailers use. These links form supply chains that every business, large and small, deals with. There is simply no way around it. more

NIS2 Directive Article 23 Will Lead to Inconsistencies and Conflicts Within the Domain Name Industry

On May 12th, European legislators head into their final trilogue negotiations around the NIS2 Directive. This week, the Internet Infrastructure Coalition (i2Coalition) shared guidance found below with negotiators, focused on the Directive's Article 23. i2Coalition has been detailing our concerns about Article 23 before even their public consultation in March 2021. more

Building a More Inclusive Internet for All: A Radix Initiative

Universal Acceptance (UA) is a fundamental requirement for a truly multilingual and digitally inclusive Internet. UA is important because it ensures that all domain names, including new long top-level domains (TLDs) and Internationalized Domain Names (IDNs), and email addresses are treated equally and can be used by all Internet-enabled applications, devices, and systems. more

Breaking the Rules on Counterfeit Sales: The Use of Hidden Links

Counterfeiting is big business. A 2021 study by the Organisation for Economic Cooperation and Development (OECD) estimated that the international trade in counterfeit and pirated products was worth up to $464 billion in 2019, or around 2.5% of all world trade. A significant proportion of this trade occurs via digital channels, where global annual expenditure on eCommerce is more than $4 trillion. more

Home Broadband and the Cloud

I'm not sure that most people understand the extent to which our online experience has moved to the cloud -- and this movement to the cloud means we're using a lot more bandwidth than in the recent past. A huge number of online functions now reside in the cloud, when only a few years ago, a lot of processing was done on our computers. Take the example of Twitter, where I keep an account to upload a copy of my blog every day. more