Hot Topics:   Security    Policy & Regulation    Internet Governance    Access Providers    Privacy    Broadband    Domain Names    more...

Featured Blogs

The Cock and the Goat: ICANN in the Age of Horrorism

Katim S. Touray Like everyone else, former ICANN board members have been preoccupied by the horrific November 13th, 2015 attacks on Paris, France, by a bunch of cold-blooded mass murderers. Our email list discussion of the Paris attacks covered a number of issues, including the inevitable question: what, if anything, should ICANN do in response? Some list subscribers concluded that the events had nothing to do with ICANN's mission, and that we should just sigh and move on. Others, on the other hand, said: not so fast, it would serve ICANN well to take a closer look at the matter, and its ramifications on wider world of ICANN.  more»

Officially Compromised Privacy

Dave Crocker The essence of information privacy is control over disclosure. Whoever is responsible for the information is supposed to be able to decide who sees it. If a society values privacy, it needs to ensure that there are reasonable protections possible against disclosure to those not authorized by the information's owner. In the online world, an essential technical component for this assurance is encryption. If the encryption that is deployed permits disclosure to those who were not authorized by the information's owner, there should be serious concern about the degree of privacy that is meaningfully possible. more»

Zero Rating: Something Is Better Than Nothing! Or Is It?

Said Zazai One of the primary purposes of global Internet Governance Forum (IGF) is to introduce a wide range of topics to newcomers and provide them with the opportunity to take back what they have learned in the hopes of establishing an understanding of the Internet Governance philosophy at the community or national level. As a first time participant at the 10th Global Internet Governance Forum (IGF 2015) that took place in Joao Pessoa Brazil, in early November of 2015, I felt the burden of being a representative from a developing country, a place where discussion of important issues is limited to a small group of individuals, often in informal settings, over coffee or in my case, green tea. more»

The Emotional Cost of Cybercrime

Ross Anderson We know more and more about the financial cost of cybercrime, but there has been very little work on its emotional cost. David Modic and I decided to investigate. We wanted to empirically test whether there are emotional repercussions to becoming a victim of fraud (Yes, there are). We wanted to compare emotional and financial impact across different categories of fraud and establish a ranking list (And we did). more»

Why I Wrote 'Thinking Security'

Steven Bellovin I have a new book out, Thinking Security: Stopping Next Year's Hackers. There are lots of security books out there today; why did I think another was needed? Two wellsprings nourished my muse. (The desire for that sort of poetic imagery was not among them.) The first was a deep-rooted dissatisfaction with common security advice. This common "wisdom" -- I use the word advisedly -- often seemed to be outdated. Yes, it was the distillation of years of conventional wisdom, but that was precisely the problem: the world has changed; the advice hasn't. more»

Regulation and Reason

Bill Smith Imagine living in a country where it was necessary to register with your community government by providing a copy of one of the following... This may be necessary in perhaps a large number of nations. However, as a United States citizen and resident, I was quite surprised when my local community issued the request. I investigated and found much to my dismay, that my community in fact was required by regulation to survey its residents on a biennial basis. more»

In Network Security Design, It's About the Users

Burt Kaliski One of the longstanding goals of network security design is to be able to prove that a system -- any system -- is secure. Designers would like to be able to show that a system, properly implemented and operated, meets its objectives for confidentiality, integrity, availability and other attributes against the variety of threats the system may encounter. A half century into the computing revolution, this goal remains elusive. more»

Only One Week Left to Submit Nominations for PIR Board of Directors (Closes Nov 30)

Dan York If you would like to help guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains, the deadline for nominations is MONDAY, NOVEMBER 30, 2015! After reading the information about the PIR Board requirements, you are welcome to nominate either yourself or anyone else using the PIR Nomination Form. Nominations close at 23:00 UTC on November 30, 2015, so don't delay! more»

Zero Rating, a Poisoned Chalice for the Developing World

Mwendwa Kivuva A very Interesting meeting The Internet Governance Forum (IGF) with an ambitious theme of connecting the worlds next billion people to the Internet took place in early November 2015 in a beautiful resort city of João Pessoa in Brazil under the auspice of the United Nations. Few citizens of the world paid attention to it yet the repercussions of the policy issues discussed affect us all. more»

As WHOIS Transitions to RDAP, How Do We Avoid the Same Mistakes?

Scott Hollenbeck In 1905, philosopher George Santayana famously noted, "Those who cannot remember the past are condemned to repeat it." When past attempts to resolve a challenge have failed, it makes sense to consider different approaches even if they seem controversial or otherwise at odds with maintaining the status quo. Such is the case with the opportunity to make real progress in addressing the many functional issues associated with WHOIS. We need to think differently. more»

RIPE 71 Meeting Report

Geoff Huston The RIPE 71 meeting took place in Bucharest, Romania in November. Here are my impressions from a number of the sessions I attended that I thought were of interest. It was a relatively packed meeting held over 5 days. So this is by no means all that was presented through the week... As is usual for RIPE meetings, it was a well organised, informative and fun meeting to attend in every respect! If you are near Copenhagen in late May next year I'd certainly say that it would be a week well spent. more»

USA Fibre Investments Encouraging Further Operator Expansion

Paul Budde According to data from the FttH Council, the number of homes passed with fibre in the US increased 13% in 2015, year-on-year, to 26 million. Combined with Canada and Mexico, the number of passed homes has reached 34 million. The take-up rate is excellent by international standards, at more than 50%. Commonly operators look to about 20% to 30% take-up before work can begin on new fibre infrastructure to communities. more»


Nick Ashton-Hart Internet public policy -- and the technical ecosystem -- is at a crossroads and the choice of CEO that ICANN's board makes now is probably the most important such choice it has ever made. Since I work in Internet policy across the Geneva institutions where more than 50% of all international Internet-related policy meetings take place, and have worked at ICANN in senior positions in the past, I thought I would suggest some qualities the next CEO should have. more»

How DANE Strengthens Security for TLS, S/SMIME and Other Applications

Shumon Huque The Domain Name System (DNS) offers ways to significantly strengthen the security of Internet applications via a new protocol called the DNS-based Authentication of Named Entities (DANE). One problem it helps to solve is how to easily find keys for end users and systems in a secure and scalable manner. It can also help to address well-known vulnerabilities in the public Certification Authority (CA) model. Applications today need to trust a large number of global CAs. more»

Battling Cyber Threats Using Lessons Learned 165 Years Ago

Gunter Ollmann When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near endless array of products and innovation focused on securing that end user from an equally broad and expanding array of threats, the end user remains more exposed and vulnerable than at any other period in the history of personal computing. more»

News Briefs

ISOC Joins 200 Others Urging UN to Safeguard Key Internet Principles

– The Internet Society today announced that it has joined more than 200 organizations and individuals who have signed a statement intended for leaders and governments participating in the United Nations General Assembly's 10 Year Review of the World Summit on the Information Society (WSIS+10 Review). ›››

Google Received 65.9 Million Take Down Requests Last Month, Company Reports

As part of its transparency report, Google says Copyright removal requests continue to be on steady rise and that the company received a new record 65,923,523 requests just last month. ›››

Under Pressure, ICANN Reveals Lobbying Expenses

Following several months of pressure, ICANN has revealed a breakdown of figures under its catch-all term of "professional services," exposing its political expenses, Kieren McCarthy reported today in the Register. ›››

China Seeking to Construct Its Own Uncrackable Smartphones

Beijing and leading Chinese tech firms are collaborating to build a secure smartphone for government officials that rely on domestically built operating system and processor chip, according to reports. ›››

UK Announces Additional £1.9 Billion in Cyber Security Funding

Chancellor George Osborne announces government plan to almost double its investment in cyber security initiatives over the next five years, spending an additional £1.9 billion. ›››

Vehicle Manufacturers Tell Govt to Stay Off Regulating "Internet of Cars"

Major car manufacturers in U.S. are asking Congress to stay away from any type of increased regulation unless "absolutely necessary" as the industry evolves to take advantage of the "Internet of cars." ›››

Sony Uses Brand TLD '.sony' for Bond Game Site

Sony is using it's newly secured brand Top-Level Domain, '.sony' for a game site as part of the promotion for its latest Bond movie. ›››

Bangladesh Govt Orders Internet Shutdown on 'Security Grounds'

Access to the internet was denied for about two hours in Bangladesh immediately after the Supreme Court upheld the death penalty for Salauddin Quader Chowdhury and Ali Ahsan Muhammad Mujahid. ›››

Email More Secure Today Than Two Years Ago, Research Suggests

Google in partnership with the University of Michigan and the University of Illinois, has published the results of a multi-year study that measured how email security has evolved since 2013. Although Gmail was the foundation of the research, insights from the study are believed to be applicable to email more broadly. ›››

Internet Society Reinforces Need to Connect the Unconnected, Build Trust

The Internet Society's President and CEO, Kathy Brown, has highlighted how connecting the unconnected and building trust are the two most pressing imperatives facing the Internet today. ›››

Internet a Key Catalyst for Sustainable Development, Says ISOC CEO

Internet Society President and CEO Kathy Brown wrote about the critical role that the Internet has in enabling the implementation of the UN Sustainable Development Goals (SDGs). ›››

Harm Caused by Typosquatting Is Still Modest, Research Suggests

Harm caused by domain name typosquatting is still modest, to both the user and the brand holder, and investment on anti-typosquatting products should be cautious, according to a paper published in Security and Privacy (SP), 2015 IEEE Symposium titled, "Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting." The paper presents a strategy for quantifying the harm caused by the cybercrime of typo squatting via an intent inference technique. ›››

GigaNet Symposium Will Be Held Next Week in Brazil

On Monday, 09 November 2015, the Global Internet Governance Academic Network (GigaNet) will hold its 10th Annual Symposium on Internet Governance Research in João Pessoa, Brazil. The symposium will take place as a pre-event of the United Nations Internet Governance Forum (IGF) which starts on Tuesday in the same location. During their symposium researchers from several parts of the world will address various topics including privacy, infra-structure, trust, security and more. ›››

Internet Activity in Britain Stored for a Year Under New Surveillance Law

The internet activity of everyone in UK will have to be stored for one year by Internet service providers, under the new surveillance law plans. "This duty would include forcing firms to hold a schedule of which websites someone visits and the apps they connect to through computers, smartphones, tablets and other devices. Police and other agencies would be then able to access these records in pursuit of criminals -- but also seek to retrieve data in a wider range of inquiries, such as missing people." ›››

Nauruan Gov't Says Ban on Facebook and Such Protects Citizens from "Abuse, Harassment and Bullying"

The Nauruan government says ban on websites such as Facebook is to protect its citizens from "abuse, harassment and bullying" as the United Nations urges the island's controversial regime to lift its ban on freedom of expression and human rights. ›››

Public Cloud Services in Mature Asia/Pacific Region to Reach $7.4 Billion in 2015

The public cloud services market in the mature Asia/Pacific (AP) region is on pace to grow 8.7 percent in 2015 to total $7.3 billion, up from $6.7 billion in 2014, according to new research from Gartner. ›››

New Bill Bans Internet Companies From Offering Unbreakable Encryption

Companies such as Apple, Google and others will be banned from offering encryption so advanced that even they cannot decipher it when asked to under the UK's Investigatory Powers Bill. ›››

EU Parliament Says Citizens Rights Still in Danger, Calls for Immediate Measures

Members of the European Parliament have taken stock of the lack of action taken to safeguard citizens' fundamental rights following revelations of electronic mass surveillance. ›››

Cuba's Internet Connection to the World Worse Than Expected

Inspired by expansion announcements from companies such as Netflix and Airbnb into Cuba, Fabián E. Bustamante, professor of electrical engineering and computer science in the McCormick School of Engineering, and his graduate student Zachary Bischof, conducted research examining feasibility of the business ideas given the region's notoriously weak network infrastructure. ›››

Neighbours Create Their Own Internet Service on Orcas Island

Faced with slow and outage-prone Internet access, residents of Orcas Island, one of the San Juan Islands in Washington state, decided to design their own network and built it themselves. ›››

Popular News – Last 30 Days

Recent Comments

Officially Compromised Privacy
Taking Back the DNS
The TPP and the DNS
The TPP and the DNS
The TPP and the DNS
The TPP and the DNS

Featured Cartoon

Meanwhile in Yet Another IG Panel

Sponsored Topics

Industry Updates

Radix's .ONLINE Fastest to Sell 100,000 Domains

Radix After a very successful launch (38,000 domains in the first 24 hours) and breaking all nTLDrecords, .online surpassed 100,000 domain registrations this morning. Radix shared the 100,000th domain to be registered -- that came through eNom. more»

To Where are Bounce Messages Sent?

Port25 This seems to be one of the greatest mysteries to new postmasters. It can be confusing as the messages go to the SMTP MAIL FROM address, which can be different from, or the same as the from header. The key to understanding bounces (sometimes referred to as DSNs, Delivery Status Notifications or NDRs, Non-Delivery Reports) is that they should always be sent to the SMTP MAIL FROM address. Some mail platforms may not adhere to this rule, but most do. more»

.PRO Domains Now Available to All

Afilias Global registry leader Afilias announced that beginning today, .PRO is an unrestricted Top Level Domain open to all registrants. That means that everyone is now eligible to register a domain name ending with .PRO, such ''. more»

Computerworld Names Afilias' Ram Mohan a Premier 100 Technology Leader

Afilias IDG's Computerworld announces Ram Mohan, Afilias' executive vice president and chief technology officer, as a 2016 Premier 100 Technology Leaders honoree. This year's Premier 100 spotlights 100 leaders of companies for their exceptional technology leadership and innovative approaches to business challenges. more»

An Open Source Perspective on Commercial MTAs

Port25 It's always refreshing to obtain a different perspective, especially from the open-source community regarding email sending infrastructure. For those who are currently utilizing an open-source product, we thought this feedback from one of our constituents would be valuable for decision makers. more»

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Verisign As part of our efforts to support National Cyber Security Awareness Month by sharing the latest cybersecurity research, Verisign released its Q3 2015 DDoS Trends Report, which represents a unique view into attack trends unfolding online for the previous quarter. more»

Five Essential PowerMTA Configuration Tips

Port25 When asked what are the best configurations to use with PowerMTA? The answer is different for every region of the world. Configuration settings in the US will be vastly different than those in Europe for example, so global settings are not as effective. more»

Protect Your Privacy - Opt Out of Public DNS Data Collection

Verisign We've all seen the check boxes. They're hidden at the bottom of webpages. You can't ignore them, but sometimes you forget they are there. They offer to send you deals and coupons. Some even offer to connect you with their partners for similar benefits. Do you check the box? more»

What's New With Port25's PowerMTA v4.5

Port25 Port24 recently intruded PowerMTA v4.5 as a major new release of PowerMTA. It now includes a wide variety of new advanced features and functionalities that allow for greater flexibility and delivery control to help maximize overall performance and deliverability. more»

The ".law" Domain Gains Momentum Throughout the Legal Profession

Minds + Machines Minds + Machines has announced that the .law domain names may be applied for by qualified lawyers on a first-come, first-served basis at standard rates. The seven-day Early Access Program, during which .law domain names were priced higher to accommodate initial demand, ended at 1600 UTC on October 19. more»

Verisign & Forrester Webinar: Defending Against Cyber Threats in Complex Hybrid-Cloud Environments

Verisign Attend to learn some of the new tools and techniques to secure availability of applications in hybrid-cloud environments. more»


Community  –  CircleID Participants  |  View All  |  Join CircleID

Salanieta Tamanikaiwaimaro
Director of Pasifika NexusJoined on Oct 09, 2012

Tom Lowenhaupt
Director, Inc.Joined on Aug 21, 2003

Internet policy and governance consultantJoined on May 16, 2005

Bevil Wooding
Internet Strategist at Packet Clearing HouseJoined on Nov 23, 2010

Benjamin Edelman
Assistant Professor, Harvard Business SchoolJoined on Jun 14, 2003

Bill Thompson
Journalist, Commentator and Technology CriticJoined on Sep 09, 2004

Juha Holkkola
Managing Director of Nixu SoftwareJoined on Nov 15, 2011

Alex Tajirian
CEO at DomainMartJoined on Dec 08, 2004

Brian Cute
Chief Executive Officer, .ORG, The Public Interest RegistryJoined on Jul 17, 2007

Joi Ito
Joined on Apr 11, 2005

David P. Reed
Joined on May 14, 2008

Brad Templeton
Electronic Frontier Foundation (EFF) Boardmember, Entrepreneur and TechnologistJoined on Sep 16, 2003

Eric Hernaez
Chief Executive Officer of NetmoboJoined on Jun 15, 2007

Alexa Raad
CEO of ArchitelosJoined on Jun 22, 2006

Ross Rader
Director of Innovation & ResearchJoined on Jun 14, 2003

Ryan Baker
Industry Consultant at ARI Registry ServicesJoined on May 07, 2014

Drew Clark
Executive Director at, Telecom, Media and Tech JournalistJoined on Jul 05, 2007

Danny McPherson
Senior Vice President and Chief Security Officer at VerisignJoined on May 22, 2008

Suresh Ramasubramanian
Antispam OperationsJoined on Jun 21, 2004

Tom Lenard
President, Technology Policy InstituteJoined on Apr 06, 2010

Ron Aitchison
Consultant, developer and authorJoined on Oct 04, 2005

Steve Atkins
Founding partner of anti-spam consultancy & software firm Word to the WiseJoined on Nov 23, 2009

Kieren McCarthy
Executive Director at IFFOR; CEO at .NxtJoined on Jul 09, 2006

Richard J Tindal
Joined on Feb 07, 2009

Frank Michlick
COO at / CEO at Domain CocoonJoined on Jan 30, 2005

Sophia Bekele
CEO of DotConnectAfricaJoined on Oct 06, 2011

Peter HJ van Eijk
Cloud Computing Coach, Author and SpeakerJoined on Aug 18, 2006

John Matson
Co-Founder and COO of ArchitelosJoined on Jul 11, 2011

Marvin Ammori
Fellow at the New America Foundation, Lawyer at The Ammori GroupJoined on Apr 04, 2013

Irwin Lazar
AnalystJoined on Apr 24, 2007