On 29 July 2025, the UN organized a WSIS+20 Informal Stakeholder Consultation at which a number of government and stakeholder representations made three-minute statements. This was in response to the Elements Paper circulated by the WSIS+20 Review's Co-facilitators, an important initial step en route to the zero draft of the text that will be the basis of negotiations and consultations over the next months in advance of the formal WSIS Review in the UN General Assembly in December. more
The shift to IPv6 has escalated into a matter of national security, as nations lagging in adoption are increasingly exposed to cyber threats and diminished control over their digital infrastructure due to the limited availability of IPv4. With IPv6-only environments becoming more common, reliance on IPv4 may lead to slower connectivity, deepening the digital divide and potentially worsening economic disparities. In this geopolitical landscape, moving to IPv6 serves as a critical step toward maintaining digital independence. more
On Wednesday, 9 July, I attended the WSIS+20 HLE Overall Review multistakeholder consultation with co-facilitators H.E. Mr Ekitela Locale from the Republic of Kenya, and H.E. Ms Suela Janina from the Republic of Albania with my UNU-CRIS hat and had the opportunity to talk with them together with my fellow youth IGF colleagues Dana Cramer and Jasmine Ko. We discussed youth participation in Internet governance, and I raised my concerns about the future of youth IGFs. more
2025 is not a banner year for the status quo. A fashion for deregulation, ignoring processes and questioning whatever was long-established is finding enough adherents that even things which work well are being upended. That's why those looking for leverage to use in hurried dealmaking, or countries with plans to rebalance where digital power lies, may find a handy tool in ICANN. more
A Supreme Court judge in Mauritius has been appointed to investigate AFRINIC, Africa's IP address registry, following allegations of misconduct, legal irregularities, and criminal falsification. The inquiry marks a pivotal moment in African internet governance, with implications for regional digital infrastructure and the continent's credibility in managing critical online resources. more
The future of the Internet Governance Forum (IGF) is an important part of the WSIS+20 review process. But after 20 years, the key question should now be its organizational evolution, more than just how long its mandate should be extended or whether it should be rebranded. The time has come for a constitutional moment for the IGF. A dedicated review process should take place in 2026 around three core questions. more
Many previous pieces of research have focused on the desirability of a comprehensive scoring system, to be used for ranking results identified as part of a brand-protection solution, according to their potential level of threat. Such scoring systems offer the capability for identifying prioritised targets for further analysis, content tracking or enforcement actions. more
Today, I share a warning about serious changes to the Community Priority Evaluation (CPE) of the New gTLD Applicant Guidebook. They are not driven by public comment, but by a few voices within the SubPro Implementation Review Team - and they are very likely to lead to disastrous misappropriation of well-known community names, including those of Tribes, Indigenous Peoples and NGOs around the world. more
What might look like a routine procedural dispute over votes is, in fact, a glaring reminder that Regional Internet Registries (RIRs) are now geopolitical pressure points - and that ICANN's oversight of RIR governance must evolve to meet these risks. On 23 June 2025, AFRINIC, the RIR that serves Africa, attempted to hold long-delayed elections to restore stability after years of legal battles and board paralysis. Yet instead of restoring trust, the process imploded almost immediately. more
Over the past decade, cloud computing has experienced explosive growth, evolving from its nascent stage to widespread adoption and fundamentally changing how businesses and individuals use information technology. At the same time, traditional on-premise computing, while still having its use cases, has been progressively integrated with, and often even controlled by, Cloud Service Providers (CSPs) in many aspects. more
The international community has long struggled with the challenge of translating international law into actionable norms and practices in cyberspace. The conclusion of the United Nations Open-Ended Working Group (OEWG) on the security of and in the use of information and communications technologies 2021-2025 marks a vital milestone in that ongoing process. more
This study analyzes the differences in domain name and IP address strategies among a number of current mainstream artificial intelligence (AI) service providers. We find that these technical choices not only reflect deployment decisions but also deep-seated corporate knowledge and capabilities in Internet infrastructure service provision, as well as brand positioning and market strategies. more
We've had a quiet policy change in the United States over the last year, where satellite broadband is starting to be considered broadband by the federal government. Any rural household that subscribes to and loves Starlink would wonder why this is news, but from a policy perspective, it is a big deal. I've been considering what this shift might mean in the future. The FCC decided that Starlink wasn't broadband when it rejected Starlink's long-form filing in August 2022, where Starlink wanted to claim the funding it had won in the RDOF reverse auction. more
Two sets of authors sued Anthropic and Meta in San Francisco for copyright infringement, arguing that the companies had pirated their works to train their LLMs. Everyone agreed that a key question was whether fair use allowed it, and in both cases, the courts looked at the fair use issue before dealing with other aspects of the cases. Even though the facts in both cases were very similar, last week, two judges in the same court wrote opinions, coming to very different conclusions. How can that happen? Is fair use broken? more
At the 20th Internet Governance Forum in Lillestrøm, Norway, the UN Internet Governance Forum's dynamic coalition Internet Standards, Security and Safety (IS3C) released its new report on post-quantum policies. This report presents the findings of a collaborative study undertaken by IS3C and the French domain name registry Afnic and examines the critical need for Post-Quantum Cryptography (PQC) to achieve greater security in the ever-expanding global IoT landscape. more
As published on June 24, 2025, it is with no surprise that the AFNIC was renewed as the backend registry provider of the .PARIS new generic Top-Level Domain. What caught my attention in the announcement was this paragraph: “Afnic’s remit will also be expanded to include communication and promotion of the .paris TLD, as well as the development of initiatives designed to increase its adoption by businesses and private individuals.” more
An international institutional battle of sorts has been playing out in a segment of the trade press over the past couple of weeks over the venue of the Oct 2027 World Radiocommunication Conference (WRC-27). The treaty conference held under the auspices of the International Telecommunication Union (ITU) Radiocommunication Sector is part of a continuum of intergovernmental activities that began in Berlin in 1903. more
Networks are typically built to provide certain services at an expected scale. The rationale for this focused objective is entirely reasonable: to overachieve would be inefficient and costly. So, we build service infrastructure to a level of sufficient capability to meet expectations and no more. In ideal conditions, this leads to a widely deployed and highly efficient infrastructure that is capable of supporting a single service profile. more
Elon Musk assured us that he would not stop the Starlink service in Ukraine. But, given his feud with Trump, his criticism of President Zelensky, and his rash actions with DOGE, can he be trusted? (His termination of USAID is estimated to have resulted in 340,000 deaths so far.) When askedabout Musk's influence, Josef Aschbacher, director general of the European Space Agency, said he declined to comment on "the internal politics of the United States and who should influence these decisions" but added "If changes happen and if our US partners and friends are changing their plans, of course we will be ready for plan B. more
As the global digital order enters an era of intensifying geopolitical tension, debates over digital sovereignty have re-emerged as a defining fault line in Internet governance. At stake is not merely who controls data or infrastructure within national borders but whether the vision of a globally interoperable, open Internet, one of WSIS's founding principles, can be meaningfully sustained. more
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Huntress was alerted to the recent BlueNorroff attack when an end-user reported potentially downloading a malicious Zoom extension on 11 June 2025. As it turned out, the malware came disguised as a Calendly meeting invite from a supposed contact sent via Telegram. more
The Cybersecurity & Infrastructure Security Agency (CISA) added CVE-2025-32433 and CVE-2024-42009 to the Known Exploited Vulnerabilities (KEV) Catalog on 9 June 2025 after they were reportedly abused by APT28 to hack government webmail servers in an operation dubbed "RoundPress." more
The second quarter of 2025 closed with 371.7 million domain name registrations across all top-level domains (TLDs), an increase of 9.3 million domain name registrations compared to the second quarter of 2024, according to the latest issue of the Domain Name Industry Brief Quarterly Report released Thursday at DNIB.com. more
After years of steady ascent, the market for IPv4 addresses is experiencing an uncharacteristic softening. According to new data from IPv4.Global by Hilco Streambank, the average monthly price per address has declined across all block sizes, with the most striking plunge seen in the larger /16 blocks. more
Palo Alto Unit 42 reported on the latest Slow Pisces attack that engaged with cryptocurrency developers on LinkedIn. The threat actors posed as potential employers and sent malware disguised as coding challenges. Developers who took on the challenge ended up running a compromised project, infecting their systems with RN Loader and RN Stealer. more
UNC5174, a Chinese-sponsored group known for using the open-source reverse shell tool named "SUPERSHELL," struck again. In January 2025, they used a new open-source tool and command-and-control (C&C) infrastructure dubbed "SNOWLIGHT." This time around, they have begun using another tool dubbed "VShell." more
The Federal Bureau of Investigation (FBI) issued a FLASH report to disseminate indicators of compromise (IoCs) for the Funnull infrastructure that threat actors used to manage domains related to cryptocurrency investment fraud scams between October 2023 and April 2025. The report provided links to two lists. more
SentinelLABS recently dug deep into AkiraBot, a framework made to spam website chats and contact forms to promote a low-quality search engine optimization (SEO) service. So far, the bot has targeted 400K+ websites and spammed 80K+ websites since September 2024. more
The U.S. Department of Justice seized 114 domains connected to a major information-stealing campaign utilizing Lumma Stealer on 21 May 2025. The Cybersecurity and Infrastructure Security Agency (CISA) released the list of indicators of compromise (IoCs) on the same date. more
Yahoo! News Japan reported cases where securities accounts were hijacked so cybercriminals could sell stocks without their rightful owners' permission. More than 3,500 fraudulent transactions have already been recorded from January to April 2025 alone, amounting to stock owner losses of ¥300+ billion. more
What is a Dedicated IP VPN? A Dedicated IP VPN is a Virtual Private Network (VPN) service that provides users with a unique, static IP address assigned exclusively to them. Unlike a shared IP address, which is used by multiple users simultaneously, a dedicated IP is reserved for a single user, offering greater control and security over their online activities. more
Starlink provides high-speed, low-latency satellite internet, making it ideal for rural and remote areas lacking traditional broadband. Installation is user-friendly, and coverage continues to expand globally. However, the service is relatively expensive, and performance can be impacted by adverse weather. Overall, Starlink is a reliable choice for those without access to conventional internet options. more
ISPs can see that you are using a VPN, as they can detect encrypted traffic and the IP address of the VPN server. However, they cannot see the content of your data or the websites you visit while the VPN is active because the data is encrypted. This provides privacy for your online activities, though the fact that you're using a VPN itself is visible to the ISP. more
Satellite internet is a broadband service that connects users via signals transmitted between orbiting satellites and a satellite dish at the user's location. Unlike fiber or cable, it doesn't require physical infrastructure, making it essential in rural and remote areas. Although historically slower with higher latency, advancements like Low Earth Orbit (LEO) satellites have improved speed and reduced delays, enhancing overall performance. more
Yes, NordVPN still works with Netflix in 2024. It effectively bypasses geo-restrictions, unlocking libraries from major regions like the U.S., UK, Japan, and more. However, occasional issues like blocked servers or slow connections may arise. Troubleshooting, such as switching servers or using SmartPlay, typically resolves problems and maintains reliable access to Netflix. more
NordVPN offers two ways to try the service risk-free: a 7-day free trial for Android users and a 30-day money-back guarantee for all users. Both options allow full access to NordVPN's premium features. The trial requires payment details but can be canceled before charges occur. NordVPN provides superior security, performance, and global content access compared to free alternatives. more
NordVPN stands out for its unique double encryption, adding an extra layer of privacy. With blazing-fast servers in 60 countries, it's perfect for streaming, gaming, and bypassing geo-blocks. Its strict no-logs policy and advanced features like CyberSec ad-blocker make it a top choice for anyone seeking strong security and seamless performance. more
The best countries for VPN server locations include Switzerland, Iceland, and Panama for privacy, Germany, Japan, and the United States for fast connections, and the U.S., U.K., and Canada for streaming. These countries offer strong privacy laws, advanced infrastructure, and optimal performance for various online activities. more
VPNs are critical for remote work because they secure data by encrypting internet connections, protecting sensitive company information from cyberattacks. They also enable remote access to company networks, ensuring employees can work safely from any location while maintaining privacy and compliance with security policies. more
A VPN protects you by encrypting your internet connection, hiding your IP address, and routing your data through a secure server. This shields your online activities from hackers, trackers, and surveillance, ensuring privacy and security, especially on public Wi-Fi or when accessing sensitive information. more