/ Most Viewed

Why I Wrote ‘Thinking Security’

I have a new book out, Thinking Security: Stopping Next Year's Hackers. There are lots of security books out there today; why did I think another was needed? Two wellsprings nourished my muse. (The desire for that sort of poetic imagery was not among them.) The first was a deep-rooted dissatisfaction with common security advice. This common "wisdom" -- I use the word advisedly -- often seemed to be outdated. Yes, it was the distillation of years of conventional wisdom, but that was precisely the problem: the world has changed; the advice hasn't. more

Global Domain Name Market Reaches 372 Million Domains, 1.5% Growth in 2024

Afnic, the French association in charge of the .fr domain and several other Internet Top Level Domains, has published the 2024 edition of its annual analysis "The Global Domain Name Market". Here is a summary of the overarching trends and key figures. more

Hackers in Possession of Over 312K Files, 516GB Financial Data of Some of World’s Largest Companies

A report broke today revealing hackers have successfully breached a German internet infrastructure firm that provides services to several large companies, including Ericsson, Leica, Toshiba, UniCredit, British Telecom, Hugo Boss, NH Hotel Group, Oracle, Airbus, Porsche, and Volkswagen. more

Principles, Factors, and Elements that Promote or Undermine the Outcome of UDRP Cases

Panels adjudicating cybersquatting claims, defenses, and rebuttals under the Uniform Domain Name Dispute Resolution Policy (UDRP) expect parties to prove their contentions, and this means having a working understanding of what this entails. There is, first, a set of fundamental rules or principles -- such as pending applications for a mark do not constitute a right, or recognizing unregistered marks as constituting rights... more

The Issue of License Proliferation

When I was on the ICANN board, we were dealing with the issue of Internationalized Domain Names (IDNs), an initiative to allow non-latin characters in domain names. Technically, it was difficult and even more difficult was the consensus process to decide exactly how to do it. Many communities like the Chinese and Arabic regions were anxious to get started and were getting very frustrated with the ICANN process around IDNs. ... When I joined the Open Source Initiative board of directors, we were also struggling with a similar, but slightly different problem. more

EFF Urges EURid to Refuse EU Commission’s “Misguided Advice” to Eliminate UK-Registered .EU Domains

In response to the European Commission surprise announcement last week that British domain owners may no longer be entitled to keep their ".eu" domain names, EFF is urging the registry for .eu (EURid) no to follow through. more

New Harvard Study Recognizes Community-Owned Internet Service Providers as Value Leaders in America

Community-owned fiber networks provide least-expensive local "broadband," according to a recent study by Harvard's Berkman Klein Center. more

Cuba’s (Hopefully Limited) ADSL Expansion

In 2015, ETECSA announced/leaked a plan to make ADSL service available in 50% of Cuban homes by 2020. I was skeptical. Doing so would mean investing a lot of money for obsolete technology between 2015 and 2020. They have recently announced the availability of ADSL connectivity at homes in portions of seven cities and, by December, they say some home connectivity will be available in every province. more

Three Generations of Cuban WiFi Hotspot Sharing

As soon as ETECSA began installing public access WiFi hotspots, black market resellers began sharing connections. They would connect a laptop to an ETECSA account then use pirated copies of Connectify, a connection sharing program running on the laptop, to create small WiFi hotspots of their own. At the time, ETECSA charged 2 CUC per hour online (two day's pay for many Cubans) and the re-sellers typically charged 1 CUC per hour. They broke even with two users and made a profit with more. more

Microsoft’s Datacenter in Wyoming Powered Entirely by Wind Energy

Microsoft has announced the purchase of its largest wind energy to date -- 237 megawatts of wind energy -- which will in turn allow its datacenter in Cheyenne, Wyoming to be powered entirely by wind power. more

Achieving Connectivity vs. More “Broadband”

Our problem isn't the lack of capacity -- it's our inability to achieve simple connectivity. We have abundant capacity but can’t use it because we have gatekeepers who set a price on our ability to communicate and innovate. If we were able to take advantage of what we already have we would find ourselves with a wealth of opportunities rather than having to pay billions to "stimulate" the gatekeepers into letting us create new value. more

The Early History of Usenet, Part V: Authentication and Norms

We knew that Usenet needed some sort of management system, and we knew that that would require some sort of authentication, for users, sites, and perhaps posts. We didn't add any, though -- and why we didn't is an interesting story. The obvious solution was something involving public key cryptography, which we (the original developers of the protocol: Tom Truscott, the late Jim Ellis, and myself) knew about: all good geeks at the time had seen Martin Gardner's "Mathematical Games" column... more

Swedish National Defense Radio Agency to Wiretap All Internet Traffic

Several people abroad have started mailing me and others asking if rumors of new legislation to be passed in Sweden on the 17th of June is for real. There are also reports in international forums starting to pop up. This is fairly old news, and I think that most of us are surprised that this has not generated more press both inside and outside Sweden earlier. This legislation will allow for the Swedish National Defense Radio Agency (FRA) to wiretap Internet traffic leaving the country... more

Outlawing Botnets

The European Commission is apparently considering the promulgation and adoption of a directive that would, at least in part, criminalize botnets. As I understand it, the premise behind adopting such a directive is that since botnets are capable of inflicting "harm" on a large scale, we need to separately criminalize them. I decided to examine the need for and utility of such legislation in this post. more

Meet the Metaverse

I had already written this blog before Facebook announced it would be hiring at least 10,000 programmers to start moving the company towards the metaverse. I see the metaverse as one of the next big drivers of increased bandwidth usage. Wikipedia defines the metaverse as a collective virtual shared space created by the convergence of virtually enhanced physical reality and physically persistent virtual space, including the sum of all virtual reality worlds, augmented reality, and the Internet. In the most basic sense, the metaverse consists of online worlds where people interact through avatars. more