/ Most Viewed

EFF Founder John Perry Barlow Has Died

Electronic Frontier Foundation founder John Perry Barlow, has died at the age of 70, according to a statement issued by the Foundation. more

Negotiating the WSIS+10 and the Future of the Internet

After two and a half years of technical analysis and discussions, six months of deliberations among all stakeholders, and intense negotiations at the United Nations, at three o'clock in the morning on December 12, 2015, the talented co-facilitators from the United Arab Emirates and Latvia dropped the gavel on the outcome document for the ten-year review of the World Summit on the Information Society (WSIS). That consensus document presents international principles that will guide the UN's work on Information and Communications Technology (ICT)-related issues. more

Study Finds Majority of U.S. Gov’t Agencies Fail to Meet Security Mandate for DNSSEC Adoption

Majority of U.S. Federal agencies using .gov domains have not signed their DNS with DNSSEC (Domain Name Security Extensions) despite a December 2009 Federal deadline for adoption, according to the latest report by IID (Internet Identity). IID analyzed the DNS of more than 2,900 .gov domains and has released the results in its "Q3 State of DNS Report". more

STEM to STEMM: It Will Take Musicians to Save the Internet

The internet is under all kinds of attacks from all kinds of people for all kinds of reasons. It’s not just the internet’s infrastructure that is under attack, so too is the very concept of the internet as an open communications platform serving the commonweal. Constructing effective technical defenses of the internet will require that America’s students learn and develop the quantitative disciplines known as STEM; Science, Technology, Engineering, and Mathematics. Constructing effective, ethical defenses of the internet will require that students study art and philosophy. The two educational paths are symbiotic... more

How a Resilient Society Defends Cyberspace

Seventy-five years ago today, on May 29th, 1934, Egyptian private radio stations fell silent, as the government shut them down in favor of a state monopoly on broadcast communication. Egyptian radio "hackers" (as we would style them today) had, over the course of about fifteen years, developed a burgeoning network of unofficial radio stations... It couldn't last. After two days of official radio silence, on May 31st, official state-sponsored radio stations (run by the Marconi company under special contract) began transmitting a clean slate of government-sanctioned programming, and the brief era of grass-roots Egyptian radio was over... more

Starlink’s zoomready Rating Is Going Down

zoomready is open-source shareware I wrote to measure the suitability of an internet connection for teleconferencing. As you can see above, Starlink had an average zoomready rating of 2.66 out of a possible 3.0 over the four measured days. The problem is NOT bandwidth, which has fluctuated but stayed above the minimums needed for good teleconferencing. The problems are failures (most of them short), latency, and jitter. more

Have You Reviewed Your Domain Lock Portfolio?

Domain names give your intellectual property visibility, as well as provide function for your company's infrastructure. Vital domain names are simply too important to be left exposed. To protect them, you can add extra layers of security to your digital brand with easy, secure, server-level protection in addition to multi-level locks that combat domain name system (DNS) hijacking and protect against unauthorized changes and deletions to your critical domain names. more

Submarine Cable Resiliency in the Face of Disruptions

I have on my desk a rather small tube. It's a little under 2cm in diameter, 6 cm long, and looks like it's made from a dull white polycarbonate material. At the end, I can see a copper inner tube, and inside that, another polycarbonate layer, and then a smaller steel tube that holds a thin steel thread and some fibre optic cables. There are no layers of steel jacketing, nor any other additional wrapping at all. more

FCC’s Ignorant Extraterritorial Jurisdiction Bravado

The Federal Communications Commission yesterday released a Report and Order in the matter of its implementation of Ray Baum's Act Section 503 and international call spoofing. The FCC mostly did the right things in the R&O except in one rather extraordinary assertion of legal ignorance and bravado. It asserted unilaterally that it could exercise "extraterritorial jurisdiction that Congress expressly provided in section 503 of the Ray Baum's Act," and it furthermore knew of no "treaty obligation [contravened],...nor other legal barrier...and...are aware of none." more

Kieren McCarthy: Issue Guide to ICANN San Francisco Meetings

As the ICANN's 40th international meetings start off in San Francisco, Kieren McCarthy, General Manager (US) of the Global Internet Business Coalition (GIBC), and founder of the .NXT conference, has released a guide for the most important topics (listed below) with some added commentary, background and links to relevant resources. more

Blocking Amplification Attacks: Sometimes the Incentives Work Against You

Since the end of last year, amplification attacks have been increasingly used by attackers and received heavy media coverage. Everyday protocols not given much thought before, like Network Time Protocol (NTP), can be asked in a very short remote command to send a very large response (list of 600 clients last connected to the NTP server) to a spoofed IP address (the target) by the requestor/attacker. more

Hitachi Second Major Consumer Brand to Announce .Brand TLD Application

Kevin Murphy reporting in DomainIncite: "Japanese electronics giant Hitachi has emerged as the second big consumer brand to officially announce it will apply for a '.brand' top-level domain. GMO Registry, also based in Japan, is the company's back-end provider of choice, according to this news release..." more

A Look at the Security Collapse in the HTTPS Market

While in recent years, HTTPS has become integral part of protecting social, political, and economic activities online, widely reported security incidents -- such as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed -- have exposed systemic security vulnerabilities of HTTPS to a global audience. more

U.S. Appeals Court Upholds FCC’s Net Neutrality Rules

The US broadband industry has lost its lawsuit attempting to overturn the Federal Communications Commission's net neutrality rules and the related reclassification of Internet service providers as common carriers. more

The IPv4 Price Inversion

A curious price inversion has occurred in IPv4 markets. The long-term trend that discounted large blocks has reversed. The graph identifies /15 and /16 (large) block pricing per IP address throughout the period in the form of dark spots. It is evident that, for most of the timeframe here (2014 to the first half of 2021), large blocks sold at a significant discount. One might guess that the administrative chores related to large-network needs were most efficiently and cheaply satisfied with large blocks. more