/ Most Viewed

U.N. Cybercrime Convention Enters Critical Stage

Negotiations for a U.N. cybercrime convention have reached a critical stage at the fourth round of discussions in Vienna. Delegates from over 150 states have met for over 100 hours to discuss the proposed convention, which has been met with skepticism from some states, nongovernmental organizations, and other stakeholders more

The Christmas Goat and IPv6 (Year 13)

2022 was not a normal year for me. We sold our company of almost 25 years to Interlan Gefle AB to Nordlo Group, and I also moved away from Gävle city to Boänge, a small rural village outside Sandviken where my ISP (AS20626) still isn't ready for IPv6 in my location.... ☹ ( I use a Mikrotik with a Wireguard tunnel to solve my IPv6 today.) It's 2023 when I'm writing this, and I can't understand why ISPs still haven't deployed IPv6! more

FCC’s Ignorant Extraterritorial Jurisdiction Bravado

The Federal Communications Commission yesterday released a Report and Order in the matter of its implementation of Ray Baum's Act Section 503 and international call spoofing. The FCC mostly did the right things in the R&O except in one rather extraordinary assertion of legal ignorance and bravado. It asserted unilaterally that it could exercise "extraterritorial jurisdiction that Congress expressly provided in section 503 of the Ray Baum's Act," and it furthermore knew of no "treaty obligation [contravened],...nor other legal barrier...and...are aware of none." more

New Cyber Security Bill Could Increase Power of President and DHS

Introduced by ranking Senate members of the Homeland Security and Governmental Affairs Committee, the Protecting Cyberspace as a National Asset Act of 2010, S.3480 is intended to create an Office of Cyber Policy in the executive branch of the government, confirmed by the Senate and ultimately reporting to the president. Senators Joe Lieberman, Blanche Lincoln and Tom Carper introduced the bill publicly on June 10, and a critical part of the bill is that critical infrastructure networks such as electricity grids, financial systems and telecommunications networks need to cooperate with the Office of Cyber Policy. more

BGP Security: A Gentle Reminder that Networking is Business

At NANOG on the Road (NotR) in September of 2018, I participated in a panel on BGP security -- specifically the deployment of Route Origin Authentication (ROA), with some hints and overtones of path validation by carrying signatures in BGP updates (BGPsec). This is an area I have been working in for... 20 years? ... at this point, so I have seen the argument develop across these years many times, and in many ways. more

Report Looks at Humanitarian Futures for Messaging Apps

To develop responsible, effective and safe ways to use messaging apps, organizations need to better understand the opportunities and risks they present - new research report released by The Engine Room in partnership with International Committee of the Red Cross (ICRC) and Block Party. more

NTIA Chief Suggests “Cooling Off Periods” for ICANN Staff Before Moving On to Outside Jobs

In a statement delivered during the ICANN63 in Barcelona, David Redl,
Assistant Secretary of Commerce for Communications and Information (NTIA) said that while the community has greatly improved ICANN's accountability there is still room left for improvements. more

No External Attacks Behind GoDaddy’s Major Outage, Says Company

GoDaddy.com has reported today that the Web hosting outage that involved thousands and possibly millions of websites on Monday was due to internal issues and did not involve any attacks by hackers. The outage lasted for about four hours and affected mainly small-business sites. GoDaddy.com hosts more than 5 million websites. more

Hosters: Is Your Platform Being Used to Launch DDoS Attacks?

As anyone who's been in the DDoS attack trenches knows, large multi-gigabit attacks have become more prevalent over the last few years. For many organizations, it's become economically unfeasible to provision enough bandwidth to combat this threat. How are attackers themselves sourcing so much bandwidth? more

Is UN SG Guterres Driving the Bus That Macron Threw UN IGF & Multistakeholderism Under at IGF Paris?

A fresh & transparent, community-led, bottom-up, public debate has now become unavoidable and undeferrable. "....we need limited and smart regulation" were the clear and unambiguous words of UN Secretary-General Antonio Guterres at the launch of the final report of his UN Panel on Digital Cooperation last week in New York. Last November, I wrote about President Macron throwing down the gauntlet at UN IGF Paris challenging IGF and Multistakeholderism to become more relevant.  more

U.S. Federal Government Response Too Slow to Friday’s Internet Attack, Warns Cybersecurity Official

"We often refer to the Cuyahoga River in Cleveland that caught on fire over 20 times before we actually did something to introduce the Clean Water Act," says Allan Friedman, the director of cybersecurity initiatives for the Department of Commerce's National Telecommunications and Information Administration (NTIA), in conference call on Monday. more

Time to Spread the Muck, ICANN

"Money is like muck, not good except it be spread", according to English philosopher Francis Bacon. In these times when everyone is busy with the big questions surrounding the IANA transition and ICANN accountability, I thought we could quickly solve some simple questions. One of them is: What should ICANN do with all that money? What money, you might ask? more

No Government Veto Over Future Top-Level Domain Names

Declan McCullagh reporting in CNET News: "The Obama administration has failed in its bid to allow it and other governments to veto future top-level domain names, a proposal before ICANN that raised questions about balancing national sovereignty with the venerable Internet tradition of free expression. A group of nations rejected that part of the U.S. proposal last week, concluding instead that governments can offer nonbinding 'advice' about controversial suffixes such as .gay but will not receive actual veto power." more

Website Monitoring Practices Taking Advantage of Critical Loopholes in Privacy Protection

Researchers at the University of California, Berkeley's School of Information have released a report raising concern over website monitoring practices which appear to be taking advantage of critical loopholes in privacy protection. According to the study, most popular websites in the United States "all share data with their corporate affiliates and allow third parties to collect information directly by using tracking beacons known as 'Web bugs' -- despite the sites' claims that they don't share user data with third parties." more

Encryption = good : Backdoor = bad

Every time there is a tragic attack on people or property, there is a cry from various authorities or politicians for law enforcement to get unfettered access to all kinds of communication tools. But that would cause far more harm than good, and is a really bad idea. The argument goes something like this: 'These bad actors hide behind encrypted communications to plan their evil deeds...' more