/ Most Viewed

SpaceX Launches “Second Generation” Starlink Satellites

In interviews last Spring, Elon Musk said the data throughput of the next version of Starlink satellite (Gen2) would be almost an order of magnitude greater than that of the first generation and that the new Starship rocket would be needed to launch them. Regulatory and engineering delays slowed Starship's progress, so the Gen2 satellites Musk referred to at the time have not yet been launched. more

When Proxy Services Enable Abuse

People are growing increasingly alarmed by recent examples of bad actors abusing proxy services offered by registrars. While proxy services are designed to protect the privacy of legitimate domain name users - they do the opposite when abused by cybercriminals. Responsible Proxy providers play a key role in mitigating abuse. When they don't act responsibly - it's clear they contribute to the problem. more

Internet Regulation in the Age of Hyper-Giants

As we enter the seventh round of the net neutrality fight, advocates continue to make the same argument they've offered since 2002: infrastructure companies will do massive harm to little guys unless restrained by strict regulation. This idea once made intuitive sense, but it has been bypassed by reality. ... When Tim Wu wrote his first net neutrality paper, the largest telecoms were Verizon, AT&T, and SBC; they stood at numbers 11, 15, and 27 respectively in the Fortune 500 list. more

Domain Names Users vs Domain Names Registrants

Antony Van Couvering from names@work writes that ICANN's constituencies are a "bad idea". While I am not sure to agree with him on the general principle, he makes some interesting remarks. Among others, he points out that the Generic Names Supporting Organization (GNSO) includes groups that seem to be redundant (the Business and Intellectual Property constituencies) and others like domainers which are not represented in the ICANN arena, yet are an integral part of the domain name business... more

Libyan Government Seizes vb.ly Domain

The one-page link shortening service provider, vb.ly, has been seized with no apparent warning by the Libyan government which manages the ".ly" county code Top-Level Domain (ccTLD). According to reports, Nic.ly, the registry operator of the ccTLD in Libya informed the user of the domain that the content of its website was considered offensive, obscene and illegal by the Libyan Islamic Sharia Law and therefore revoked. more

New Report of Afnic on the Global Domain Name Market: Strong Contrasts and Disparate Regional Dynamics

Afnic, the association responsible for several Internet Top Level Domains, including the .fr country-code TLD, shares its annual global domain name market analysis. In this new report, the association deciphers global trends and highlights the specific characteristics of the different segments and the regional particularities. more

What Duopoly?

For the last twenty years, the industry has talked about broadband in cities as a duopoly, meaning there was competition between cable companies and telcos -- competition between cable modem broadband and DSL broadband. Twenty years ago, there was a true duopoly when the speeds on DSL and cable modem were close in capability. The market at that time demonstrated real duopoly behavior. more

Even if Do-Not-Track Were a Good Idea, Could It Ever Work?

In a recent article, I read about increasingly intrusive tracking of online users, which has lead to a proposal at the FTC, "FTC Chairman Jon Leibowitz said the system would be similar to the Do-Not-Call registry that enables consumers to shield their phone numbers from telemarketers." Maybe I'm dense, but even if this weren't a fundamentally bad idea for policy reasons, I don't see how it could work. more

Russian Security Firm Kaspersky Announces Its Own Secure OS, 14 Years in the Making

"I've anticipated this day for ages -- the day when the first commercially available mass market hardware device based on our own secure operating system landed on my desk," writes Eugene Kaspersky, Chairman and CEO of Kaspersky Lab, in a blog post introducing company's layer 3 switch powered by Kaspersky OS. more

ChatGPT Used to Create Polymorphic Malware

ChatGPT, the newly released language model, has quickly gained popularity and is used for various tasks, from automation to music composition. While having useful features like fast and easy-to-use code examples, it also has the ability to create sophisticated malware without malicious code. more

Top Five Recommendations for IoT Policymakers from ITAC Industry Participants

As the Department of Commerce considers a policy role for the U.S. government in the Internet of Things (IoT), the Department of State is studying a dynamic and evolving international environment around IoT, including technical, commercial, and economic issues. Governments and intergovernmental organizations across the world are waking up to the potential of IoT, and some are looking to move quickly in a nascent landscape to establish themselves as leaders for IoT globally. In the process, few are reaching out to industry. more

A Little Flexibility from ICANN and We Might Just Get IDNs… for Everyone

Nobody doubts that some time in the near future there will be Internationalized Domain Names (IDNs) in Chinese, Russian or Arabic scripts. The Chinese, Russian and Arabic-character-using worlds are large -- encompassing hundreds of millions of current and potential users. They are politically influential blocs, with the ability to demand action in international meetings. And perhaps most importantly, they are -- at least when taken together -- rich. Everybody knows that access on the web in these languages is not a matter of if, but simply a question of when... more

The Path Towards Centralization of Internet Governance Under UN: Part 1

This essay is the first of a three-part series, written by Anonymous, and published by the Publius Project of the Berkman Center for Internet and Society at Harvard University. It focuses on the steps of a possible roadmap for centralizing Internet governance under the United Nations. more

Recognizing ICANN’s Failures

The Internet Corporation for Assigned Names and Numbers (ICANN) has failed on a number of fronts, resulting in sub-par products and services in a global monopolistic environment. Failures will continue if not recognized and immediately addressed. Leadership is about the future, a journey into uncharted territory, and it requires vision supported by technical, operational, and mind-changing competencies. ... It does not require a rocket scientist to recognize that ICANN has fallen short because it lacks... more

The Internet And Its Governance: Where Should We Look For Models?

The US Department of Commerce (DOC) has recently signed a new contract with the Internet Corporation for Assigned Names and Numbers (ICANN) for one more year. ICANN and the DOC are to continue to work together to design an organizational form that is suitable to administer and control the infrastructure of the Internet. That infrastructure includes the IP numbers, which are critical to the functioning of the Internet protocol TCP/IP. These numbers must be unique for the Internet to continue to function. The infrastructure also includes the protocols that make the Internet possible. Protocols involve the conventions or agreements that each network that is part of the Internet accepts in order to make communication possible across the boundaries of the different technical and political and administrative entities that comprise the networks of the Internet. Another component of the Internet's infrastructure is the domain name system (DNS). This system includes the names that identify various sites on the Internet and the translation of those names into IP numbers via the system of computers that make the one to one mapping between names and numbers. more