Just after the government announces a crackdown on Internet smut. Yesterday, they announced plans for "Netizen Day" on September 14th, which apparently marks 15 years since the first e-mail message was sent from China in 1987. The new celebratory day (I don't think it's an official holiday) was unveiled at an official ceremony presided over by Chinese government officials and Internet execs, many of whose companies - including Google, Sina, and Sohu, who were named in the smut crackdown just 24 hours before. more
The recent research highlighting the alarming practice of Secure Socket Layer (SSL) Certificate Authority (CA) vendors using the MD5 hashing algorithm (which was known to be broken since 2005) has shown a major crack in the foundation of the Web. While the latest research has shown that fake SSL certificates with MD5 hashes can be forged to perfection when the CA (such as VeriSign's RapidSSL) uses predictable certificate fields, the bigger problem is that the web has fundamentally botched secure authentication. more
In fact WiFi (technically standard 802.11) and WiMAX (802.16) don't compete for broadband users or applications today. That's partly because WiFi is widely deployed and WiMAX is still largely an unfulfilled promise and partly because the two protocols were designed for very different situations. However, if WiMAX is eventually widely deployed, there will be competition between them as last mile technologies. Some people describe the difference between WiFi and WiMAX as analogous to the difference between a cordless phone and a mobile phone... more
Domain name disputes have been on steady rise for the past several years and have more than doubled since 2003. As reported today by Pingdom, while there was a period between 2000 and 2003 when the number of domain dispute cases declined, they have been continuously increased since 2003 with most cases involving more than one domain name. more
An acquaintance wondered why the people who run the systems that receive mail get to make all the rules about what gets delivered. After all, he noted: "The sender pays for bandwidth and agrees to abide by the bandwidth provider's rules." It is useful to think of the Internet as a collection of tubes, all leading from the periphery to the middle, where the middle is approximately "the peering point." The sender has paid for the tubes leading from himself to the middle... more
Well, it's a yearly tradition in the western hemisphere that at the end of the year, we compose a top 10 list of the 10 most
It seems highly likely to me that at some point in the future we'll all look back and say that 2008 was the year that the VoIP industry finally died... Voice over IP is just a transport and signalling technology. It's plumbing. It may come as a surprise to some of you to know that in the late 1980's and early 1990's there was a TCP/IP industry as well. TCP/IP is inarguably plumbing. As the IP stack became common on all computing devices, TCP/IP went from being a differentiator to a commodity. more
On Monday the Wall Street Journal published an article alleging that Google was trying to arrange a "fast lane for its own content" with telecom carriers and contending that Google and Professor Lessig were in the midst of changing their position on network neutrality policy. The WSJ reporters received a lot of flak for the piece -justifiably so. There was no real "news" in this news article. more
In the upcoming Internet Measurement Conference being held next week in Vouliagmeni, Greece, a team of six researchers will be presenting a paper called "Census and Survey of the Visible Internet," based on a comprehensive census of more 2.8 billion allocated IP addresses on the Internet. The research is claimed to be the first comprehensive census of its kind in more than two decades. more
The Wall Street Journal and others are reporting that the Recording Industry Association of America is adjusting its strategy for combating the massive infringement occasioned by the sharing of music files over the internet. Since 2003, that strategy has been to pursue copyright infringement cases against individual file sharers. The RIAA now says it will focus less on pursuing infringement litigation and more on working with internet service providers to shut down the accounts of individuals suspected of illegally trading files. more
Always good for information on the spam economy, Brian Krebs of the Washington Post has just published a truly fascinating article: Researchers Hijack Storm Worm to Track Profits. Bottom line: a one-in-twelve-million conversion rate of spam to sales seems to be enough to keep the spam economy going. The article covers a project by researchers at UC San Diego and UC Berkeley, who managed to infiltrate the Storm Worm bot network and take over a small portion of it. more
Early this month I attended the 3rd Internet Governance Forum in Hyderabad, India. The overall theme of the 4-day meeting was "Internet for All"... Last Friday, I spent a couple of hours in the morning on email before I got cutoff around 10am. I have 2 DSL lines at home through 2 different ISPs, I tried both lines but they were both down. I thought something wrong happened at the local exchange and decided to turn off my computer and enjoy my weekend. The last thing I could have thought about then was that what happened back in January 2008 was happening again in less than a year! more
It is sometimes said that: 'IP addresses are hoarded by "developed nations" - if only "underdeveloped" nations were given more IP addresses, the Internet would grow more/better...' Assertions like this mistakenly conflate the administrative process of requesting and receiving public IP addresses with the economic or commercial act of routing IP addresses - of engaging in what is sometimes called "Internet production." The former, administrative process involves relatively little in the way of overhead, and confers nothing more than the potential to develop public Internet resources -- i.e., to create new Internet users (provide access) and/or Internet uses (provide content and other online services). more
Legal trademark issues related to domain names will take a long time to resolve. Meanwhile, using a statistical model to determine infringement benefits all parties. The legal system has not yet established comprehensive and easy to understand rules under which a domain name is considered to infringe on a third party's trademark. The vacuum allows trademark owners and their agents, such as the Coalition Against Domain Name Abuse (CADNA), to sue domain name owners pretty much at will, but doing so is not always in the best interest of trademark holders. more
Domain tasting, as everyone probably knows by now, is the disreputable practice of registering lots of domains, seeing how much traffic they get, and then using the five day Add Grace Period (AGP) to refund the 99.9% of them that aren't worth paying for. A related abuse is front running, registrars speculatively grabbing domains that people inquire about to prevent them from using a different registrar. more