Blogs

Building Trust in Digital Travel: Interoperability, Privacy, and the Future of Global Mobility

Digital travel credentials promise to streamline air travel by enabling privacy-preserving identity sharing across borders. Their success will depend on interoperable standards, trusted governance and gradual adoption alongside passports worldwide as governments airlines cooperate.

Reflecting on WSIS+20 and Youth’s Role in Redefining Stakeholder Classification

At ICANN85, reflection on WSIS+20 highlights a quieter milestone: youth successfully secured recognition as a distinct stakeholder group, reshaping how Internet governance defines participation and offering a blueprint for other overlooked communities seeking voice today.

The Internet No Longer Needs Permission

Governance rules built for the early Internet are struggling to keep pace with a global, automated network. As IPv4 markets mature and infrastructure becomes software-defined, registries may need to prioritise transparency and automation over permission.

How Bad Actors Are Leveraging DNS: Looking at the Latest Trends

Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence.

The Rapid Evolution of Transport Lasers

Exploding internet traffic and AI demand are driving a rapid upgrade in fibre transport lasers, from early one gigabit systems to 400, 800 and even 1.6 terabit links reshaping backbone capacity worldwide as networks scale.

How Internet Sovereignty Is Reshaping Company Tech Stacks

As governments assert internet sovereignty, global networks are quietly fracturing. Data localisation, sovereign cloud rules and political risk are forcing companies to redesign technology stacks once built for a borderless internet.

The IRP Docket Speaks Louder Than Theory - A Response to Charles Mok on ICANN and AI Governance

A critique of ICANN's multi-stakeholder model argues that its accountability record, revealed through more than a dozen IRP disputes, shows structural failures that should caution policymakers seeking institutional blueprints for governing artificial intelligence systems globally.

Why DNS-Level Piracy Enforcement Is a Trap

Efforts to combat online piracy are pushing courts to weaponise the Internet's naming system. Turning DNS operators into enforcement agents may deliver quick takedowns, but risks collateral damage, jurisdictional conflict and long-term fragmentation of the Internet.

The Ghost Asset on Telco Balance Sheets: Using IPv4 to Fund the AI Transition

Hidden on telecom balance sheets, legacy IPv4 address space is emerging as a monetizable asset. Leasing underutilized blocks can generate recurring cash flow that helps fund AI infrastructure, modernization, and network investment without increasing debt.

Rising Costs of Broadband Construction

Despite steady expansion of fibre networks, the cost of building them is rising. New survey data show labour-heavy construction, higher aerial costs and persistent inflation pressures likely to push deployment expenses higher in 2026.

ICANN’s Ultimate Demise?

ICANN's proposed overhaul of root server governance would empower a new council to revoke America's operator status, risking a clash with a resurgent Trump administration and potentially imperiling the multistakeholder model that underpins the internet's core infrastructure.

Do We Need Alignment Between Internet Governance and AI Governance?

A debate over aligning internet and AI governance reveals stark differences in origin, incentives and power. While lessons from ICANN's multi-stakeholder model endure, AI's corporate dominance and geopolitical rivalry demand new, bottom-up approaches.

The AI Effect: Why Brand Impersonation Is Becoming Industrialised

Generative AI has turned brand impersonation from a nuisance into an industrial-scale threat, eroding trust. As ICANN's 2026 round approaches, DotBrand domains promise a structural fix to spoofing that strategies failed to deliver in 2012.

The Challenge of Adding Fiber to Poles

An FCC ruling in a dispute between Comcast and Appalachian Power clarifies pole attachment cost rules, but exposes how regulatory delays and uncooperative utilities can slow fiber deployment and raise costs for broadband providers.

The Geopolitical Protocol: Can QUIC and LEO Satellites Mitigate the Risks of Fragile Subsea Cables?

As geopolitical tensions expose the fragility of subsea cables, Low Earth Orbit satellites and the QUIC protocol promise a more resilient internet by diversifying routes, preserving session continuity, and redefining control over global data flows.

News Briefs

Iranians Outsmart Internet Blackout to Broadcast Airstrikes

Iran Expands Digital Dragnet After Crushing Protests

David J. Farber, Early Architect of the Internet, Dies at 91

The Internet’s Address Crisis: IPv4 Stalls, IPv6 Stagnates

Iran Nears Completion of Internet Kill Switch Amid Protests, Says Iran International

Why Starlink is Failing to Pierce Iran’s Total Internet Blackout

Iran Cuts Off Internet Nationwide as Regime Disrupts Even Starlink Amid Expanding Protests

ICANN Announces Deadline for 2026 New Top-Level Domain Applications

Governing the Invisible: AI Risks in Telecom Infrastructure Outpace Global Legal Frameworks

NANOG 95: From Faster Fibre to Route Leaks, Operators Face Old Problems with New Tools

AWS Unveils Route 53 “Accelerated Recovery” to Bolster DNS Resilience

US Senators Move to Shield Undersea Internet Cables from Global Threats

China Spurs eSIM Boom as Global Connections Set to Quadruple by 2030

Configuration Chaos: Cloudflare Explains Major Outage in Detailed Post-Mortem

Cloudflare Outage Highlights Internet’s Growing Single Points of Failure

AI System Abused in China-Linked Cyberattack, Says Anthropic

AI Boom Spurs Record Investment in Undersea Cables Amid Geopolitical and Security Concerns

Governance or Capture? Africa’s Internet Rules Face a Double Standard, Expert Warns

AI-Powered Malware Evolves: Google Uncovers Live Use of Generative Models in Active Intrusions

Verizon and AWS Expand Network Ties to Meet AI Data Demands

Most Viewed

Trench Warfare in the Age of The Laser-Guided Missile

Taking Back the DNS

Note to John McCain: Technology Matters

WiMAX vs. WiFi

Freedom of Expression Part 3: Child Pornography, Manga, Anime, Obscene Publication

Most Commented