/ Most Commented

Google Responds to Criticisms Over Proposed Net Neutrality

Responding to recent controversies over Google-Verizon deal, Richard Whitt, Google's Washington Telecom and Media Counsel writes: "Over the past few days there's been a lot of discussion surrounding our announcement of a policy proposal on network neutrality we put together with Verizon. On balance, we believe this proposal represents real progress on what has become a very contentious issue, and we think it could help move the network neutrality debate forward constructively. We don't expect everyone to agree with every aspect of our proposal, but there has been a number of inaccuracies about it, and we do want to separate fact from fiction." more

Harvard’s Berkman Center to Study ICANN’s Accountability and Transparency Review Process

The Berkman Center for Internet & Society at Harvard University announced today that it "will conduct an independent, exploratory study analyzing ICANN's decision-making processes and communications with stakeholders." The study is aimed at developing a framework and recommendations for understanding and improving ICANN's accountability and transparency. "The Berkman Center's final report will be made publicly available after ICANN's Accountability and Transparency Review Team has had the opportunity to utilize its findings in recommendations to the ICANN board." more

Security Experts Urge Shifting from Defense to Offense in Cybersecurity

A report, released today by McAfee, Inc., titled "Security Takes the Offensive," says that traditionally, security technology companies and computer users have taken a defensive posture, putting the cyber equivalent of body armor on computers, networks and in the cloud. The report's authors say it is now time to avoid enemy strikes altogether by taking a more aggressive stance, aligning forces and involving law enforcement. more

Do Not Track: Not as Simple as it Sounds

Over the past few weeks, regulators have rekindled their interest in an online Do Not Track proposal in hopes of better protecting consumer privacy. ... There are a variety of possible technical and regulatory approaches to the problem, each with its own difficulties and limitations, which I'll discuss in this post. more

Google and Verizon Offer a Gift to Spammers

Earlier today, Google and Verizon offered a widely publicized "Proposal for an Open Internet." There's been extensive comment with lots of reasons not to like it, but one I haven't seen is that the proposal would make it much harder to filter so-called "mainsleaze" spam. ... The problem is that under the pitifully weak CAN-SPAM law, a lot of spam is entirely legal. more

The Good, the Bad and the Ugly in the Google-Verizon Legislative Framework

Google and Verizon have developed a "Proposal" on Internet access which I am sure they expect to serve as a template, starting point and frame of reference going forward. In light of the FCC's judicial reversal in the Comcast case, the absence of substantive progress at the FCC and the unlikelihood of congressional action, two major stakeholder can and have taken the lead. It should come as no surprise that Verizon and Google have emphasized and begrudgingly compromised on their corporate interests. more

Want a New gTLD? Some Items to Consider

Over three years ago ICANN boldly announced that the top level of the domain name system would be opened up to new registry operators. As we now approach a likely spring 2011 launch, a number of key issues remain unresolved including how trademarks will be protected. more

Psst - Interested in Some Lightly-Used IP Addresses?

The Internet Service Provider (ISP) community is carefully watching the impending depletion of the unassigned IPv4 address pool. Most estimates place the depletion of the central pool of unassigned IPv4 addresses by mid-2011. After that, each Regional Internet Registry (RIR) will continue to satisfy requests for additional IPv4 space for a limited time (depending on the rate of incoming requests and the amount of address space on hand in the RIR at the time of central pool depletion). more

IPv6: The Four Horsemen of the IPcalypse

War, famine, pestilence and death. They fought for the last IPv4 addresses, hoarded and sold them at outrageous prices, traffic and commerce came slowly to a halt... Pestilence invaded the internet... Bandits roam the lands. A retired general told recently that the internet looks like the North German plains, easy to invade. Cyberwar and Cybersecurity are becoming mainstream subjects and have increasing Government attention. more

About Those “Mission Critical” Bits

News that Google and Verizon are negotiating "better than best efforts" Internet routing probably comes across as a betrayal of sorts to network neutrality advocates. Bear in mind that Information Service Providers ("ISPs") do not file public contracts known as tariffs and have the freedom to negotiate deals with individual clients. On the other hand ISPs, regardless of their FCC regulatory classification, cannot engage in unfair trade practices that achieve anticompetitive goals such a tilting the competitive playing field in favor of a corporate affiliate, or special third party. more

GlavMed Hacks U.S. Government Website

Garth Bruen writes: A report in LegitScript takes a look at Russian rogue Internet pharmacy hacking US government website. "As rogue Internet pharmacy networks become more sophisticated, even US government websites are at risk. Today, we're taking a look at how a rogue Internet pharmacy linked to a criminal network operating out of Russia and Eastern Europe has hacked into a US government website. The Millennium Challenge Corporation, a US foreign aid agency, utilizes a ".gov" top-level domain, which is assigned to the control of the US government. Domain names ending in .gov are typically administered by the General Services Administration." more

DNSSEC Taking Center Stage at 2010 Black Hat

On July 28th DNSSEC took center stage at the 2010 Black Hat Conference in Las Vegas. Two years ago, at the same conference, Dan Kaminsky unveiled the infamous DNS bug that many believe became a major catalyst for DNSSEC implementation. To kick things off, Jeff Moss -- founder of Black Hat -- in his opening speech called out the fact that "we have not solved any fundamental problems" and noted that the technical community must catch up. more

Using Facebook for Verisimilitude? For real?

I recently became aware of the new pay-by-mobile phone service Venmo.com. "Pay friends with your phone, skip the ATM, Settle up on meals, rent, bills and drinks" ... Venmo are using Facebook connect as a way of verifying user identities, at least that is what they claim. more

Even if Do-Not-Track Were a Good Idea, Could It Ever Work?

In a recent article, I read about increasingly intrusive tracking of online users, which has lead to a proposal at the FTC, "FTC Chairman Jon Leibowitz said the system would be similar to the Do-Not-Call registry that enables consumers to shield their phone numbers from telemarketers." Maybe I'm dense, but even if this weren't a fundamentally bad idea for policy reasons, I don't see how it could work. more

Broadband Tariffs: The Significant Gap Between Residential and Business

Analysis from Point Topic's recent reports on global broadband tariffs has revealed a significant gap in residential and business tariffs worldwide. Clearly businesses are paying more for their services than residential consumers but the relative differences in the ratios is more marked than might be expected. The first thought is that they are paying for more bandwidth and that is true to an extent. more