[Newsclips] IETF SYN-ACK Newspack 2024-03-11

David Goldstein <david@goldsteinreport.com> Mon, 11 March 2024 05:01 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F06CDC14F5EB for <newsclips@ietfa.amsl.com>; Sun, 10 Mar 2024 22:01:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.095
X-Spam-Level:
X-Spam-Status: No, score=-7.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=goldsteinreport.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H_BjTJ1qTqOh for <newsclips@ietfa.amsl.com>; Sun, 10 Mar 2024 22:01:27 -0700 (PDT)
Received: from mars.atomiclayer.com (mars.atomiclayer.com [66.85.142.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 500CCC14F689 for <newsclips@ietf.org>; Sun, 10 Mar 2024 22:01:27 -0700 (PDT)
Received: from David2019Desktop (unknown [101.190.18.154]) by mars.atomiclayer.com (Postfix) with ESMTPSA id CF8256C61E9 for <newsclips@ietf.org>; Mon, 11 Mar 2024 01:01:25 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=goldsteinreport.com; s=default; t=1710133286; bh=0qItUbrNVBT7Ma62B06z6d9mMxmFaAQu0glrtFRFWVQ=; h=From:To:Subject; b=Vz0rHjGO9MSqveH8WYz/60d0/A82GTvBT33yPToFzUZLrnEE1H+yiihXlANP3CdGz sUABoKwwLSCZn1Z8ezRRsaFVdReWSIV3mqMblbCq+UDMzPCZxnkyLjEGErHl+h1CDw On5Db4LyPyt4Kexo+EUlYMfdWMtFPaCNONLJPpVI=
Authentication-Results: mars.atomiclayer.com; spf=pass (sender IP is 101.190.18.154) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (mars.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 11 Mar 2024 16:01:23 +1100
Message-ID: <00b201da7371$2ba4f2e0$82eed8a0$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00B3_01DA73CD.5F16F180"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdpzcSMERjzobryAQz+Z4Hb2ODVH/g==
Content-Language: en-au
X-PPP-Message-ID: <171013328661.662482.2678815503049632204@mars.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/1ayAjk-1MfWBe_X8uR8jYzM1qcY>
Subject: [Newsclips] IETF SYN-ACK Newspack 2024-03-11
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Mar 2024 05:01:32 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Without a LEG to Stand On

The DNS is one of the bedrock protocols that makes the Internet work. It's also the home to incredible innovation and transformation. Almost 70 different RFCs document best practices, protocol evolution and operational procedures for the DNS. It's understandable: the DNS is the most extensible, reliable, global database on the Internet. As a result, many people want to use it for many different purposes. ... An interesting proposal has emerged in the IETF's DNSOP Working Group that suggests a possible solution to this dilemma. The proposal suggests that a new kind of DNS record, called DELEG, be created so that when a resolver asks for information about a particular domain, it gets the new DELEG record along with the NS record. The main idea is that DELEG would be backward compatible with DNS resolvers which didn't implement DELEG, but would provide a method to signal capabilities to DNS resolvers that did understand DELEG.

< <https://dnsrf.org/blog/without-a-leg-to-stand-on/index.html> https://dnsrf.org/blog/without-a-leg-to-stand-on/index.html>

 

Digital sovereignty and standards

There have been several occasions when the IETF has made a principled decision upholding user expectations of privacy in their use of IETF-standardized technologies (either that, or they were applying their own somewhat liberal collective bias and to the technologies they were working on!).

< <https://blog.apnic.net/2024/03/06/opinion-digital-sovereignty-and-standards/> https://blog.apnic.net/2024/03/06/opinion-digital-sovereignty-and-standards/>

 

[Podcast] DELEG — in-band DNS delegation

In this episode of PING, APNIC’s Chief Scientist Geoff Huston discusses a new proposed DNS resource record (RR) called DELEG. The record is being designed to aid in managing where a DNS zone is delegated. ... Read more about DELEG on the APNIC Blog and on the IETF website.

< <https://blog.apnic.net/2024/03/07/podcast-deleg-in-band-dns-delegation/> https://blog.apnic.net/2024/03/07/podcast-deleg-in-band-dns-delegation/>

 

Digital Sovereignty and Internet Standards

There is a view that Internet standards, and the IETF in particular, are at the centre of many corporate and national strategies to exert broad influence and shape the internet to match their own preferred image. This view asserts that standards have become the most important component of the Internet’s infrastructure. Due to their economic and strategic importance, the process of creation of internet standards are inevitably subject to the intense economic and political tensions between diverse world views. There are, naturally, other views, along the lines that the IETF does little other than reflect the more general pressures and directions being taken by industry actors, and has no ability to exert any leadership role in this space.

< <https://www.potaroo.net/ispcol/2024-03/sovreignity.html> https://www.potaroo.net/ispcol/2024-03/sovreignity.html>

< <https://circleid.com/posts/20240305-digital-sovereignty-and-internet-standards> https://circleid.com/posts/20240305-digital-sovereignty-and-internet-standards>

 

**********************

IETF COMMUNITY NOTES

**********************

IAB Workshop on Barriers to Internet Access of Services (BIAS)

The Internet Architecture Board (IAB) organizes workshops about topics of interest to the community that bring diverse experts together, raise awareness, and possibly identify the next steps that can be explored by the community. The IAB held its “Barriers for Internet Access of Services (Bias)” fully online workshop during the week of January 15, 2024.

< <https://www.ietf.org/blog/iab-bias-workshop/> https://www.ietf.org/blog/iab-bias-workshop/>

 

**********************

SECURITY & PRIVACY

**********************

eu: Navigating through Challenges and Opportunities of Cybersecurity Standardisation

The hybrid conference discussed the future of European cybersecurity standardisation, the challenges related to the new legislation, standards for new requirements on digital products, and the standardisation of the security of supply chains and their components.

< <https://www.enisa.europa.eu/news/navigating-through-challenges-and-opportunities-of-cybersecurity-standardisation> https://www.enisa.europa.eu/news/navigating-through-challenges-and-opportunities-of-cybersecurity-standardisation>

 

ISC2 Survey: How Is AI Reshaping Cybersecurity?

According to a new survey from ISC2, the nonprofit member organization that promotes cybersecurity education, 82% of cybersecurity professionals say AI will improve their job efficiency by helping them conduct analysis, automate tasks, perform monitoring, predict vulnerabilities and block threats.

< <https://www.bankinfosecurity.com/isc2-survey-how-ai-reshaping-cybersecurity-a-24500> https://www.bankinfosecurity.com/isc2-survey-how-ai-reshaping-cybersecurity-a-24500>

 

Tackling cybersecurity vulnerabilities through Secure by Design

In today’s cybersecurity landscape, vulnerable software can act as the conduit for devastating events. That’s why it’s critical that technology is safe before it reaches people, before we start coding, and throughout its lifecycle — it’s what we call technology that is Secure by Design.

< <https://blog.google/technology/safety-security/tackling-cybersecurity-vulnerabilities-through-secure-by-design/> https://blog.google/technology/safety-security/tackling-cybersecurity-vulnerabilities-through-secure-by-design/>

 

us: NIST's Software Un-Standards

The National Institute of Standards and Technology (NIST) has become a beacon of hope for those who trust in federal standards for software and AI safety. Moreover, lawmakers and commentators have indicated that compliance with NIST standards ought to shield entities from liability. With more than a century of expertise in scientific research and standard-setting, NIST would seem to be uniquely qualified to develop such standards.

< <https://www.lawfaremedia.org/article/nist's-software-un-standards> https://www.lawfaremedia.org/article/nist's-software-un-standards>

 

us: White House's Software Engineering Advice + Child Safety and Encryption Bans

This week the U.S. Office of the National Cyber Director (ONCD) published a report calling for the adoption of memory safe programming languages. It's remarkable such a technical document has been published by the White House.

< <https://www.lawfaremedia.org/article/white-house's-software-engineering-advice-child-safety-and-encryption-bans> https://www.lawfaremedia.org/article/white-house's-software-engineering-advice-child-safety-and-encryption-bans>

 

**********************

QUANTUM NETWORKING

**********************

Are We Ready for the Quantum Age? Preparing for the Risks of Quantum Technologies with Rights-Respecting Policy Frameworks

At what point will we declare that quantum technologies are no longer emerging, but have fully arrived? Whatever the breakthrough is that signals the tipping point, legal frameworks are not yet ready to handle the impacts of widespread quantum computing on people, societies and the rights they hold. Recent developments in the artificial intelligence (AI) policy space provide a useful roadmap for anticipating the evolution of policy approaches for regulating quantum technologies and the universe of risks they will bring with them.

< <https://www.techpolicy.press/are-we-ready-for-the-quantum-age-preparing-for-the-risks-of-quantum-technologies-with-rightsrespecting-policy-frameworks/> https://www.techpolicy.press/are-we-ready-for-the-quantum-age-preparing-for-the-risks-of-quantum-technologies-with-rightsrespecting-policy-frameworks/>

 

Unraveling the Future: Quantum Networking and its Real-World Implementation

In the rapidly evolving landscape of technology, quantum networking emerges as a groundbreaking force with the potential to reshape our digital future. Rooted in the principles of quantum mechanics, this paradigm shift offers a glimpse into a world where communication and computation transcend the limitations of classical networking.

< <https://medium.com/@rudradey2003/unraveling-the-future-quantum-networking-and-its-real-world-implementation-884f33722fde> https://medium.com/@rudradey2003/unraveling-the-future-quantum-networking-and-its-real-world-implementation-884f33722fde>

 

**********************

OTHERWISE NOTEWORTHY

**********************

Open, free, unfragmented: How the UN wants to safeguard our digital infrastructure

Digital governance is critical for economic, social and environmental development, and is a crucial enabler for sustainable development. Preserving “an open, free, globally connected, interoperable, unfragmented, and stable internet” is a prerequisite. This was one key message from the IGFin October 2023 in Kyoto, Japan, documented in the “Internet we want”-paper that was released by the IGF leadership panel.

< <https://corporate.dw.com/en/open-free-unfragmented-how-the-un-wants-to-safeguard-our-digital-infrastructure/a-68477371> https://corporate.dw.com/en/open-free-unfragmented-how-the-un-wants-to-safeguard-our-digital-infrastructure/a-68477371>

 

International Women’s Day: Let’s invest more in women in tech

Women and girls still grapple with major obstacles in today’s world, especially in the tech sector. This year’s theme for International Women’s Day recognizes where we are, urging countries, communities, and organizations worldwide to Invest in Women: Accelerate Progress.

< <https://www.itu.int/hub/2024/03/international-womens-day-lets-invest-more-in-women-in-tech/> https://www.itu.int/hub/2024/03/international-womens-day-lets-invest-more-in-women-in-tech/>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home