/ Most Viewed

Microsoft is Abandoning SHA-1 Hashes for Updates - But Why?

Microsoft is shipping a patch to eliminate SHA-1 hashes from its update process. There's nothing wrong with eliminating SHA-1 - but their reasoning may be very interesting. SHA-1 is a "cryptographic hash function". That is, it takes an input file of any size and outputs 20 bytes. An essential property of cryptographic hash functions is that in practice (though obviously not in theory), no two files should have the same hash value unless the files are identical. more

The Issue of Market-Initiated Competition in Telecoms

Many political discussions are taking place all over the world about how to best stimulate national or provincial telecommunications infrastructure investments against the background of current market dynamics. In this context the question often revolves around whether there is a market failure and, if so, does the government have a role to play here to address the matter, or can it be left for the market to sort out. more

Unsolicited Smartwatches Bearing Malware Target U.S. Service Members: Army CID Raises Alarm

U.S. military service members around the country have reported receiving unsolicited smartwatches by mail, triggering warnings from the Department of the Army Criminal Investigation Division (CID). more

2020’s New Internet Success – Rejoinder

The posting with a similar name seems a bit contrived by anonymous in some strange attempt to enhance its significance. Many others, including myself, have been discussing this subject for some time. Indeed, a concerted lobbying effort and anti-competitive efforts by legacy TCP/IP internet stakeholders have been really ramped up over the past year to mischaracterize what is occurring. more

Supporting SpaceX Starlink in Remote Communities

Five companies are developing low-Earth orbit (LEO) broadband satellite constellations, but, as of now, only SpaceX is planning to market directly to consumers. What sorts of support will they require? A pilot study of Starlink connectivity in remote Chilean communities may provide some answers to that question. The Chilean regulator, SUBTEL, has authorized a year-long pilot study of Starlink connectivity in remote, rural communities and is committed to supporting them during the year. more

DMCA Reaches the Decade Mark

My friend Kevin Thompson over at Cyberlaw Central reminded me this morning in this post that President Clinton signed the Digital Millennium Copyright Act ten years ago today. Tempus fugit. It's interesting to reflect on how this critical piece of legislation has affected (I think fostered) the growth of the online infrastructure with its safe harbor provisions found at 17 U.S.C. 512. more

Internet Control Without “Firewalls”

Open Society Fellow Evgeny Morozov and I have written an Op-Ed for Project Syndicate about how the future of Internet control is not "firewall" censorship but more subtle forms of manipulation and pressure. Recognizing that censorship is too heavy handed and imperfect to be successful on its own, the Chinese government's Internet strategy is placing increasing emphasis on corporate self-censorship... more

A Framework for Recent Internet Governance Discussions - From Montevideo Statement to 1net

There have been many significant Internet Governance developments in the last several weeks, and so I'd like to take this moment to provide a framework in which to consider these recent events. For the last several years, the leadership of several recognized Internet organizations (ISOC, ICANN, IAB/IETF, IANA, the 5 Regional Internet Registries (RIRs), and W3C; sometimes referred to as the "Internet technical organizations") have met periodically to promote better coordination between these groups. more

Perhaps It’s Time to Regulate Microsoft as Critical Infrastructure?

My main argument is about the policy of handling vulnerabilities for 6 months without patching (such as the Google attacks 0day apparently was) and the policy of waiting a whole month before patching this very same vulnerability when it first became an in-the-wild 0day exploit (it has now been patched, ahead of schedule). Microsoft is the main proponent of responsible disclosure, and has shown it is a responsible vendor... I simply call on it to stay responsible and amend its faulty and dangerous policies. more

Space Weather and Broadband

There was an interesting phenomenon that happened in September when Starlink launched 49 new satellites. The satellites were successfully deployed by the rocket, but as the satellites were being maneuvered to reach the final orbital slots, there was a geomagnetic storm that caused 38 of the satellites to fall back to earth. Space storms happen when radiation affects the magnetosphere that surrounds the earth.  more

Registered Your DMCA Contact Address Yet?

It is not much of an exaggeration to say that the Digital Millenium Copyright Act of 1998 makes the Internet as we know it possible. The DMCA created a safe harbor that protects online service providers from copyright suits so long as they follow the DMCA rules. One of the rules is that the provider has to register with the Copyright Office to designate an agent to whom copyright complaints can be sent. The original process was rather klunky; send in a paper form that they scan into their database, along with a check. more

Why ‘Open’ May Become the Keyword of the Digital World in 2022?

From open standards and software to data, 'open' has been a defining word of the internet since its early days. However, most of the digital growth around major platforms has been driven by proprietary software and 'closed' systems. Recently, companies such as Microsoft and Google have been shifting towards open-source software more and more. Over the last few years, additional momentum was created with the USA adopting the open-source approach to cope with lagging behind, mainly, Huawei in the development of 5G networks. more

Keeping IT Industry Developments in Context

The announcement that Google's chief executive Eric Schmidt is standing down from the Apple board hardly came as a surprise. Google's Android is already powering smartphones that offer an open alternative to Apple's iPhone, while the recent announcement of plans for Chrome OS, an operating system that will directly challenge Mac OS, makes Google a direct competitor to Apple in its core market... more

How Domain Data Helps Thwart BEC Fraud

It's true, domain data has many practical uses that individuals and organizations may or may not know about. But most would likely be interested in how it can help combat cyber threats, which have been identified as the greatest risks businesses will face this year. Dubbed as the greatest bane of most organizations today, cybersecurity can actually be enhanced with the help of domain data. How? more

Have You Had Your GDPR Training Today?

The suggestion was recently put to the GNSO Council: anyone who becomes a member of a proposed new Expedited Policy Development Process (EPDP) must be able to demonstrate that they have basic knowledge of privacy and data protection. This makes a lot of sense: Would you trust a lawyer who had never been to law school? Or a doctor who had never studied medicine? Of course not. Recently I asked members of our ICANN Community: have you had any GDPR training, classes, or certification? more