[Newsclips] IETF SYN-ACK Newspack 2022-03-07

David Goldstein <david@goldsteinreport.com> Mon, 07 March 2022 05:25 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C8C83A0E05 for <newsclips@ietfa.amsl.com>; Sun, 6 Mar 2022 21:25:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.597
X-Spam-Level: ***
X-Spam-Status: No, score=3.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_RUURL=3, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, UNICODE_OBFU_ASC=2.495, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I6L8UKmGswXB for <newsclips@ietfa.amsl.com>; Sun, 6 Mar 2022 21:25:00 -0800 (PST)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2203C3A0E3F for <newsclips@ietf.org>; Sun, 6 Mar 2022 21:24:59 -0800 (PST)
Received: from David2019Desktop (unknown [144.136.3.82]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id 993BE280C49 for <newsclips@ietf.org>; Mon, 7 Mar 2022 00:24:43 -0500 (EST)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 144.136.3.82) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 07 Mar 2022 16:24:41 +1100
Message-ID: <009601d831e3$a7b0f900$f712eb00$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0097_01D8323F.DB278B80"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: Adgx46EXE0GJfP1SQbWyTpJ1Mi6hFA==
Content-Language: en-au
X-PPP-Message-ID: <20220307052457.1917521.71167@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/HDSPsZD6W3vS8lYAcFhyZk8IRfI>
Subject: [Newsclips] IETF SYN-ACK Newspack 2022-03-07
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 05:25:20 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Russia's Ukraine War Raises Specter of an Online Splinternet

Russia's invasion of Ukraine is accelerating the national fragmentation of the internet's foundations and services, an idea called the splinternet. ... The technologists who invented the internet and created many of its most influential companies have fought fragmentation for years. For example, the Internet Society, the European Commission, the Internet Engineering Task Force (IETF) and European internet registry overseer RIPE pushed back against a Chinese call for centralized internet standards, which the internet pioneers considered antithetical to the network's distributed ethos. The most powerful manifestation of the splinternet is China's Great Firewall, an internet monitoring and control system the country uses to block companies like US social networks or content like Hong Kong protest information.

< <https://www.cnet.com/news/russias-ukraine-war-raises-specter-of-an-online-splinternet/> https://www.cnet.com/news/russias-ukraine-war-raises-specter-of-an-online-splinternet/>

< <https://www.msn.com/en-us/news/technology/russias-ukraine-war-raises-specter-of-an-online-splinternet/ar-AAUvKSL> https://www.msn.com/en-us/news/technology/russias-ukraine-war-raises-specter-of-an-online-splinternet/ar-AAUvKSL>

 

The War in Ukraine between Russia and Ukraine has sparked fears of an online splinter network.

The invаsion of Ukrаine by Russiа hаs exposed new crаcks in the internet’s globаl foundаtion. ... For yeаrs, the technologists who invented the internet аnd built mаny of its most powerful businesses hаve bаttled frаgmentаtion. The Internet Society, the Europeаn Commission, the Internet Engineering Tаsk Force (IETF), аnd Ripe Lаbs, for exаmple, fought а Chinese cаll for centrаlized internet stаndаrds, which the network’s pioneers sаw аs incompаtible with the network’s distributed ethos. Chinа’s Greаt Firewаll, аn internet monitoring аnd control system used to block compаnies such аs US sociаl networks аnd content such аs Hong Kong protest informаtion, is the most powerful mаnifestаtion of the splinternet.

< <https://www.cengnews.com/tech/the-war-in-ukraine-between-russia-and-ukraine-has-sparked-fears-of-an-online-splinter-network-295049.html> https://www.cengnews.com/tech/the-war-in-ukraine-between-russia-and-ukraine-has-sparked-fears-of-an-online-splinter-network-295049.html>

 

China, Russia prepare new push for state-controlled internet

... “In the ITU, bad technical decisions turn into politics, whereas in the IETF, the discussion would be about the merits of the technical proposal,” said Mallory Knodel, chief technology officer at the Center for Democracy and Technology, a Washington-based non-profit organisation.

< <https://www.euractiv.com/section/digital/news/china-russia-prepare-new-push-for-state-controlled-internet/> https://www.euractiv.com/section/digital/news/china-russia-prepare-new-push-for-state-controlled-internet/>

 

The FCC wants to make internet routing more secure – here’s what it’s up against

The U.S. Federal Communications Commission (FCC) launched a review of internet routing security, aiming to suss out what vulnerabilities exist in the Border Gateway Protocol (BGP) used by operators around the world to direct traffic and how these might be fixed. The agency indicated its move comes in response to fears the Russian government might exploit such openings in attacks against the U.S. given its recent aggression against Ukraine. But experts told Fierce the agency has a monumental task ahead of it. ... Siddiqui added the Internet Engineering Task Force (IETF) is developing additional protocols, called ASPA and AS-Cone, which will further help in overall BGP security while MANRS has released a set of best practices which operators can use to improve BGP security. The latter include steps to improve filtering, combat spoofing through the use of source address validation, improve incident response by ensuring contact information is up to date and enable global validation of issues by publishing route data.

< <https://www.fiercetelecom.com/telecom/fcc-wants-make-internet-routing-more-secure-heres-what-its-against> https://www.fiercetelecom.com/telecom/fcc-wants-make-internet-routing-more-secure-heres-what-its-against>

 

Nordic Semiconductor and Acklio demonstrate use of SCHC in live NB-IoT network [news release]

Nordic Semiconductor today [22 Feb] announces that it has collaborated with Acklio, an IoT software company based in Rennes, France, to port and demonstrate Static Context Header Compression (SCHC) running on its nRF9160 Low power System-in-Package (SiP) with integrated LTE-M/NB-IoT modem and GNSS. The nRF9160 is a popular solution for cellular IoT Low Power Wide Area Networks (LPWANs). The demonstration was made possible in a live network thanks to Deutsche Telekom IoT access provider IoT Creators and its IoT access management platform and integrated SIM, with the support of Non-IP Data Delivery (NIDD) and a simple Cloud API to exchange data with the end device. ... SCHC is a compression and fragmentation framework tailored to the needs of LPWANs and was adopted as an open standard in 2020 by the Internet Engineering Task Force (IETF). Acklio’s founders played a vital role in the development of SCHC and formed a key part of the IETF IPv6-over-LPWAN working group that defined the specification.

< <https://www.ackl.io/blog/nordic-and-acklio-demonstrate-use-of-schc-in-live-nb-iot-network> https://www.ackl.io/blog/nordic-and-acklio-demonstrate-use-of-schc-in-live-nb-iot-network>

< <https://www.nordicsemi.com/News/2022/02/Nordic-and-Acklio-demonstrate-use-of-SCHC-in-live-NB-IoT-network> https://www.nordicsemi.com/News/2022/02/Nordic-and-Acklio-demonstrate-use-of-SCHC-in-live-NB-IoT-network>

< <https://www.lembarque.com/article/nordic-adopte-dans-ses-boitiers-systemes-lte-nb-iot-la-technologie-de-compression-den-tetes-de-message-du-francais-acklio> https://www.lembarque.com/article/nordic-adopte-dans-ses-boitiers-systemes-lte-nb-iot-la-technologie-de-compression-den-tetes-de-message-du-francais-acklio> [French]

 

NATO cybersecurity center finishes tests of quantum-proof network

... "Our encryption algorithm NTS-KEM (now known as Classic McEliece, after merging with the submission from renowned cryptographer Professor Daniel Bernstein and his team), is now the only 'code-based' finalist in the National Institute of Standards and Technology (NIST) process to identify a cryptographic standard to replace RSA and Elliptic Curve, for public-key cryptography (PKC). We've also designed a new specification for a quantum-safe VPN as part of the Internet Engineering Taskforce (IETF)," Cheng said.

< <https://www.zdnet.com/article/nato-cybersecurity-center-finishes-tests-of-quantum-proof-network/> https://www.zdnet.com/article/nato-cybersecurity-center-finishes-tests-of-quantum-proof-network/>

 

Nato Cyber Security unit tests post-quantum VPN

... The VPN’s creators were the original writers of an IETF standard for a hybrid post-quantum VPN, a standard that they claim makes possible a VPN that can withstand a quantum attack.

< <https://www.computerweekly.com/news/252514105/Nato-Cyber-Security-unit-tests-post-quantum-VPN> https://www.computerweekly.com/news/252514105/Nato-Cyber-Security-unit-tests-post-quantum-VPN>

 

Post-Quantum secures NATO’s communications for the quantum era

... Post-Quantum is a ‘Hybrid Post-Quantum VPN,’ in that it combines both new post-quantum and traditional encryption algorithms. As it will take many years for the world to completely migrate to a quantum-safe future, it is more realistic to combine these new algorithms with better understood traditional encryption in order to ensure interoperability. The Post-Quantum solution was proposed to the Internet Engineering Task Force (IETF) for open standardisation.

< <https://www.helpnetsecurity.com/2022/03/03/post-quantum-nato/> https://www.helpnetsecurity.com/2022/03/03/post-quantum-nato/>

 

NATO successfully tests communication over post-quantum VPN

... Its ‘Hybrid Post-Quantum VPN’, which was proposed to the Internet Engineering Task Force (IETF) for open standardisation, combines both new post-quantum and traditional encryption algorithms.

< <https://www.information-age.com/nato-successfully-tests-communication-over-post-quantum-vpn-123498872/> https://www.information-age.com/nato-successfully-tests-communication-over-post-quantum-vpn-123498872/>

 

NATO Completes Quantum-Safe Comms Test

... Post Quantum described its technology as a “Hybrid Post-Quantum VPN,” which blends traditional encryption algorithms with those deemed “quantum-safe.” It has submitted the solution to the Internet Engineering Task Force (IETF) for open standardization.

< <https://www.infosecurity-magazine.com/news/nato-completes-quantumsafe-comms/> https://www.infosecurity-magazine.com/news/nato-completes-quantumsafe-comms/>

 

Network Analytics IETF Development at MWC 2022 by Thomas Graf

Due to the pandemic situation, after a long period of time, for the IETF 113 preparation, I had finally the pleasure to meet my colleagues in person at the Mobile World Congress 2022 in Barcelona with my team.

< <https://www.linkedin.com/pulse/network-analytics-ietf-development-mwc-2022-thomas-graf/> https://www.linkedin.com/pulse/network-analytics-ietf-development-mwc-2022-thomas-graf/>

 

The time we came up with a solution – and found a big customer problem

... Tag Switching formed the basis for much of MPLS when our group brought it to the IETF for standardization. However, there is plenty of credit to go around. Notably, some months before Yakov's memo, in 1995, Chandranmenon and Varghese published a SIGCOMM paper that introduced the idea of threaded indices, which, just like tag switching, allows a fixed-length identifier to represent a variable-length destination prefix, thus simplifying the task of looking up addresses to forward IP datagrams.

< <https://www.theregister.com/2022/03/02/mpls_history/> https://www.theregister.com/2022/03/02/mpls_history/>

 

What percentage of internet traffic is mobile?

... Monitoring and defect diagnosis at the path level; simple provisioning; quick protection switching; and robust timing synchronization. A cooperative effort by ITU-T/IETF to simplify a preexisting label-switching protocol to satisfy these features is the MPLS Transport Profile (MPLS-TP).

< <https://tynmagazine.com/what-percentage-of-internet-traffic-is-mobile/> https://tynmagazine.com/what-percentage-of-internet-traffic-is-mobile/>

 

API security methods developers should use

... Which chapter should readers pay the most attention to? Madden: Chapter 7 on OAuth 2.0. I'm part of the OAuth 2.0 working group at the IETF [Internet Engineering Task Force], working on the new specifications. OAuth 2.0 is one of the most important technologies for APIs right now and maybe even the most misunderstood.

< <https://www.techtarget.com/searchsecurity/feature/API-security-methods-developers-should-use> https://www.techtarget.com/searchsecurity/feature/API-security-methods-developers-should-use>

 

Is Your Domain Name Exposing You to Disastrous Security Risks?

... The DNS ecosystem describes all the network devices, systems, and actors that use or are impacted by the DNS. There is a lot of work going into maintaining the DNS ecosystem, whether it is regarding the development of protocols at organizations at the Internet Engineering Task Force (IETF) or the development of policies at organizations at ICANN.

< <https://www.webhostingtalk.com/showthread.php?t=1868350&p=10348128> https://www.webhostingtalk.com/showthread.php?t=1868350&p=10348128>

 

TLS vs. SSL: What's the Difference & How Does It Work

... The Historical Background of TLS and SSL: The IETF, the organization responsible for developing internet standards, published Request for Comments (RFC-1984), recognizing the importance of personal data protection in the growing internet. The Netscape Communication Corporation introduced SSL to secure web communication which underwent multiple upgrades.

< <https://www.makeuseof.com/tls-vs-ssl-whats-the-difference/> https://www.makeuseof.com/tls-vs-ssl-whats-the-difference/>

 

Nokia, Telia and Sandvik embark on world-first deployment of 5G Edge Slicing solution

... Nokia’s network slicing solution is based on 3GPP, IETF, and TMForum standards and architecture and works in multi-vendor environments.

< <https://im-mining.com/2022/02/28/nokia-telia-and-sandvik-embark-on-world-first-deployment-of-5g-edge-slicing-solution/> https://im-mining.com/2022/02/28/nokia-telia-and-sandvik-embark-on-world-first-deployment-of-5g-edge-slicing-solution/>

 

Kaspersky & Co.: Politiker fordern Neubewertung russischer Sicherheitssoftware [Kaspersky & Co.: Politicians call for re-evaluation of Russian security software]

... Offenbar will das russische Militär sich aktuell online nicht in die Karten blicken lassen. Zu erwarten gewesen wäre so der HTTP-Statuscode 403 für "verboten" oder 410 für "verschwunden". Der 418-Verweis stammt eigentlich aus einem Aprilscherz der Internet Engineering Task Force (IETF) von 1998.

< <https://www.heise.de/news/Kaspersky-Co-Politiker-fordern-Neubewertung-russischer-Sicherheitssoftware-6536765.html> https://www.heise.de/news/Kaspersky-Co-Politiker-fordern-Neubewertung-russischer-Sicherheitssoftware-6536765.html>

 

China und Russland bereiten neuen Vorstoß für staatlich kontrolliertes Internet vor [China and Russia prepare new push for state-controlled Internet]

... Die Wahl des Tagungsortes ist von entscheidender Bedeutung, da die Internetprotokolle bisher im Rahmen der Internet Engineering Task Force (IETF), einem von der Industrie angetriebenen Gremium, beschlossen wurden.

< <https://www.euractiv.de/section/all/news/china-und-russland-bereiten-neuen-vorstoss-fuer-staatlich-kontrolliertes-internet-vor/> https://www.euractiv.de/section/all/news/china-und-russland-bereiten-neuen-vorstoss-fuer-staatlich-kontrolliertes-internet-vor/>

 

Internet, Cina e Russia propongono un maggiore controllo statale sulla rete [Internet, China and Russia propose greater state control over the network]

... Si tratta di una scelta significativa, perché finora i protocolli di Internet sono stati decisi nel contesto della Internet Engineering Task Force (Ietf), un ente guidato dalle industrie.

< <https://euractiv.it/section/digitale/news/internet-cina-e-russia-propongono-un-maggiore-controllo-statale-sulla-rete/> https://euractiv.it/section/digitale/news/internet-cina-e-russia-propongono-un-maggiore-controllo-statale-sulla-rete/>

 

WHOIS o cómo saber a quién pertenece un dominio o IP [WHOIS or how to know who owns a domain or IP]

... Whois tiene los días contados y RDAP será su sustituto. RDAP es Registration Data Access Protocol. O, en español, Protocolo de Acceso a los Datos de Registro. Desde 1982 que fue publicado Whois hasta hoy, hemos evolucionado y el protocolo es muy mejorable a nivel técnico pero también a nivel de datos. Es por ello que ya esté en marcha RDAP como una versión mejorada en la que el Grupo de Trabajo de Ingeniería en Internet (IETF) ya lleva años trabajando para poner en marcha.

< <https://www.adslzone.net/reportajes/internet/whois-dominio-ip/> https://www.adslzone.net/reportajes/internet/whois-dominio-ip/>

 

Pourquoi la guerre en Ukraine fait planer le spectre d’une fragmentation d’Internet [Why the war in Ukraine raises the spectre of Internet fragmentation]

... Les technologues qui ont inventé l'Internet et créé nombre de ses entreprises les plus influentes combattent la fragmentation depuis des années. Par exemple, l'Internet Society, la Commission européenne, l'Internet Engineering Task Force (IETF) et le RIPE NCC, l'organisme européen chargé de superviser les registres Internet, se sont opposés à un appel de la Chine en faveur de normes Internet centralisées, que les pionniers de l'Internet considéraient comme contraires à l'éthique distribuée du réseau.

< <https://www.cnetfrance.fr/news/pourquoi-la-guerre-en-ukraine-fait-planer-le-spectre-d-une-fragmentation-d-internet-39938347.htm> https://www.cnetfrance.fr/news/pourquoi-la-guerre-en-ukraine-fait-planer-le-spectre-d-une-fragmentation-d-internet-39938347.htm>

 

Otan testa rede capaz de barrar ataque de computador quântico [NATO tests network capable of barring quantum computer attack]

... Cientistas preveem que os computadores quânticos um dia serão capazes de quebrar alguns métodos de criptografia comumente usados. Segundo eles, como levará muitos anos para o mundo migrar completamente para um futuro quântico seguro, é mais realista combinar esses novos algoritmos [quânticos] com criptografia tradicional, mais bem compreendida, para garantir a interoperabilidade. A solução Post-Quantum foi proposta à Internet Engineering Task Force (IETF) para padronização aberta.

< <https://www.cisoadvisor.com.br/otan-testa-rede-capaz-de-barrar-ataque-de-computador-quantico/> https://www.cisoadvisor.com.br/otan-testa-rede-capaz-de-barrar-ataque-de-computador-quantico/>

 

Wojna Rosji z Ukrainą przyczynia się do rozwoju internetowego Splinternetu [Russia's war with Ukraine contributes to the development of the Internet Splinternet]

... Technolodzy od długiego czasu walczą z fragmentacją. Do podmiotów, które próbują uniemożliwić dalszy podział należą między innymi Komisja Europejska, Internet Society, Internet Engineering Task Force (IETF), nadzorca europejskiego rejestru internetowego. Wszyscy ci sprzeciwili się na przykład chińskiemu poparciu dla centralizacji standardów internetowych, które uważali za sprzeczne z etosem sieci rozproszonej.

< <https://www.monitorlocalnews.com/wojna-rosji-z-ukraina-przyczynia-sie-do-rozwoju-internetowego-splinternetu> https://www.monitorlocalnews.com/wojna-rosji-z-ukraina-przyczynia-sie-do-rozwoju-internetowego-splinternetu>

 

TLS και SSL: ποια η διαφορά και πως λειτουργούν [TLS and SSL: what's the difference and how they work]

... Το ιστορικό υπόβαθρο των TLS και SSL: Η Ομάδα Εργασίας Μηχανικών Διαδικτύου (IETF από το Internet Engineering Task Force), ένας οργανισμός που είναι υπεύθυνος για την ανάπτυξη προτύπων Διαδικτύου, δημοσίευσε το 1984 ένα αίτημα (RFC-1984) για συζήτηση, αναγνωρίζοντας τη σημασία της προστασίας των προσωπικών δεδομένων στο αναπτυσσόμενο Διαδίκτυο και η Netscape Communication Corporation ανέπτυξε για πρώτη φορά το SSL για ασφαλή διαδικτυακή επικοινωνία, το οποία υποβλήθηκε σε πάρα πολλές αναβαθμίσεις.

< <https://iguru.gr/tls-kai-ssl-poia-diafora-kai-pos-leitourgoun/> https://iguru.gr/tls-kai-ssl-poia-diafora-kai-pos-leitourgoun/>

 

FCC, BGP 취약점 조사 착수 “러시아발 위협 대응 차원” [FCC launches BGP vulnerability investigation "to counter threats from Russia"]

... 한편 BGP를 위한 보안 프레임워크는 이미 존재한다. IETF(Internet Engineering Task Force)와 NIST(National Institute of Standards and Technology)가 BGP를 보다 안전하게 만들기 위해 여러 표준을 만들었다. FCC는 그러나 많은 네트워크가 여전히 취약한 상태로 남아 있다고 지적했다. 

< <https://www.ciokorea.com/news/227449> https://www.ciokorea.com/news/227449>

 

NATO, 양자 내성 네트워크 테스트 완료 [NATO completes quantum tolerance network testing]

... Cheng은 “저명한 암호학자인 Daniel Bernstein 교수와 그의 팀의 제출과 병합된 후 우리의 암호화 알고리즘 NTS-KEM(현재 Classic McEliece로 알려짐)은 이제 NIST(National Institute of Standards and Technology)의 유일한 ‘코드 기반’ 결승 진출다. 공개 키 암호화(PKC)에 대해 RSA 등을 대체할 암호화 표준을 식별하는 프로세스다. 또한 IETF(Internet Engineering Taskforce)의 일부로 양자 안전 VPN에 대한 새로운 사양을 설계했다”고 말했다.

< <https://scimonitors.com/nato-양자-내성-네트워크-테스트-완료/> https://scimonitors.com/nato-양자-내성-네트워크-테스트-완료/>

 

[인터뷰] “6G, 2030년에 상용화될 것” [[interview] "6G, to be commercialized in 2030"]

... ③ 시간 엔지니어링: 짧은 지연시간과 정밀한 메시지 흐름 타이밍이 핵심이다. 지연시간이 긴 상황에서도 정밀한 타이밍을 보장하는 것은 까다롭다. 특히 최근 네트워크는 시간 중심 네트워킹이라는 인상을 주기 위해 오버레이 프로토콜과 상태 비저장(Stateless)으로 작동하는 경향이 있다. 진정한 시간 엔지니어링을 위해 필요한 재설계는 3GPP(이동통신 표준화 단체)뿐 아니라 국제인터넷표준화기구(IETF) 등 다른 기관에도 영향을 준다. 유럽통신표준협회(ETSI)의 최근 자료에 따르면 고정 네트워크에서 IPv6 주소 사용 비율은 여전히 한 자릿수에 그치고 있다. 즉 IP와 전송 계층에서 새로운 기본 프로토콜로의 전환이 느리게 진행된다. 모바일은 IPv6 전용 시스템 형태로 처음부터 다시 설계되고 있는 5G의 이점을 잘 활용하고 있다. 그러나 6G의 가치는 모바일과 고정 네트워크 간 결합에서 비롯된다.

< <https://www.epnc.co.kr/news/articleView.html?idxno=220136> https://www.epnc.co.kr/news/articleView.html?idxno=220136>

 

NATOのセキュリティ機関、ポスト量子ソリューションで通信をセキュアに--試験実施 [NATO security agency secures communications with post-quantum solutions -- testing]

... 「われわれの暗号化アルゴリズム『NTS-KEM』(NTS-KEMは、著名な暗号研究学者であるDaniel Bernstein氏と同氏のチームによる提案とマージされ、現在では『Classic McEliece』という名前で知られている)は現時点で、公開鍵暗号系(PKC)における『RSA』や『楕円曲線暗号』に代わる暗号規格を選定するという米標準技術研究所(NIST)主導のプロセスにおいて、「コードベース」として最終候補に残っている唯一のものだ。われわれはまた、『IETF』(インターネットエンジニアリングタスクフォース:Internet Engineering Task Force)の一員として、量子安全性を有したVPNの新規格を設計している」(Cheng氏)

< <https://news.yahoo.co.jp/articles/8ba46e9e6daac0af9a96e42937535ccd7afc78c2> https://news.yahoo.co.jp/articles/8ba46e9e6daac0af9a96e42937535ccd7afc78c2>

 

Google、Mozilla、微軟及蘋果合作建立相同網頁設計標準 [Google, Mozilla, Microsoft, and Apple worked together to establish the same web design standards]

... 過去其實已經有W3C、IETF等網頁標準作為參考,但在不同標準之間仍存有相容落差,尤其隨著網路技術持續進步,甚至加入更多新設計方式,各標準所涵蓋項目或許會有不同。另一方面,各瀏覽器是否對應所有設計標準,或是網頁設計時所採用技術是否被納入標準,都會讓各瀏覽器開啟呈現結果產生落差。

< <https://mashdigi.com/apple-teams-up-with-google-mozilla-microsoft-to-improve-browser-interoperability/> https://mashdigi.com/apple-teams-up-with-google-mozilla-microsoft-to-improve-browser-interoperability/>

< <https://udn.com/news/story/7088/6143444> https://udn.com/news/story/7088/6143444>

 

虚拟世界「快递系统」再升级,IPv6+是个啥? | MWC 2022 [The virtual world "express delivery system" is upgraded, what is IPv6+? | MWC 2022]

... IPv6是互联网协议第6版,是互联网工程任务组(IETF)设计的用于替代IPv4的下一代IP协议。由于IPv4地址不足的问题,已经严重制约了互联网的应用和发展,IPv6的使用解决网络地址资源数量的问题,可以给地球上的每粒沙子都分配一个IP地址。

< <https://www.leiphone.com/category/chips/vIsJ69pRdFD3IIrA.html> https://www.leiphone.com/category/chips/vIsJ69pRdFD3IIrA.html>

 

Kaĸ интepнeт мpeжaтa ce фpaгмeнтиpa вce пoвeчe и пoвeчe? [How is the Internet becoming more and more fragmented?]

... Texнoлoзитe, ĸoитo cтoят зaд изoбpeтявaнeтo нa интepнeт, и cтoят зaд cъздaвaнeтo нa мнoгo oт нaй-влиятeлнитe ĸoмпaнии, ce бpoят c тaзи фpaгмeнтaция oт гoдини. Haпpимep Іntеrnеt Ѕосіеtу, Eвpoпeйcĸaтa ĸoмиcия, Іntеrnеt Еngіnееrіng Таѕk Fоrсе (ІЕТF) и нaдзopниĸът нa eвpoпeйcĸия интepнeт peгиcтъp ІRРЕ oтблъcнaxa ĸитaйcĸия пpизив зa цeнтpaлизиpaни интepнeт cтaндapти, ĸoитo интepнeт пиoнepитe cмятaт зa пpoтивoпoлoжни нa пъpвoнaчaлния зaмиcъл нa мpeжaтa.

< <https://www.kaldata.com/it-новини/как-интернет-мрежата-се-фрагментира-в-379966.html> https://www.kaldata.com/it-новини/как-интернет-мрежата-се-фрагментира-в-379966.html>

 

Что такое интернет, как он устроен и кому принадлежит [What is the Internet, how it works and who owns it]

... Совет по архитектуре интернета (IAB) — обеспечивает правильную работу интернета. Он состоит из Целевой группы по инженерным вопросам интернета (IETF) и Целевой группы по исследованиям в интернете (IRTF). Первая пишет протоколы и другие технические документы, а вторая занимается долгосрочными исследованиями (новые идеи, новые протоколы).

< <https://trends.rbc.ru/trends/industry/6223a37a9a79472fe845c934> https://trends.rbc.ru/trends/industry/6223a37a9a79472fe845c934>

 

**********************

SECURITY & PRIVACY

**********************

As Tanks Rolled Into Ukraine, So Did Malware. Then Microsoft Entered the War.

Last Wednesday, a few hours before Russian tanks began rolling into Ukraine, alarms went off inside Microsoft’s Threat Intelligence Center, warning of a never-before-seen piece of “wiper” malware that appeared aimed at the country’s government ministries and financial institutions.

< <https://www.nytimes.com/2022/02/28/us/politics/ukraine-russia-microsoft.html> https://www.nytimes.com/2022/02/28/us/politics/ukraine-russia-microsoft.html>

 

Digital technology and the war in Ukraine by Brad Smith - Microsoft President & Vice Chair

All of us who work at Microsoft are following closely the tragic, unlawful and unjustified invasion of Ukraine. This has become both a kinetic and digital war, with horrifying images from across Ukraine as well as less visible cyberattacks on computer networks and internet-based disinformation campaigns. We are fielding a growing number of inquiries about these aspects and our work, and therefore we are putting in one place a short summary about them in this blog. This includes four areas: protecting Ukraine from cyberattacks; protection from state-sponsored disinformation campaigns; support for humanitarian assistance; and the protection of our employees.

< <https://blogs.microsoft.com/on-the-issues/2022/02/28/ukraine-russia-digital-war-cyberattacks/> https://blogs.microsoft.com/on-the-issues/2022/02/28/ukraine-russia-digital-war-cyberattacks/>

 

Role of US agencies limited in protecting against BGP hijacks, attacks on internet architecture

The fundamental resilience of the global internet is strong, but manipulation of the DNSand Border Gateway Protocol (BGP), denial of service attacks, supply chain exploitation and insiders can still threaten major disruptions, according to the Government Accountability Office.

< <https://www.scmagazine.com/analysis/apt/role-of-us-agencies-limited-in-protecting-against-bgp-hijacks-attacks-on-internet-architecture> https://www.scmagazine.com/analysis/apt/role-of-us-agencies-limited-in-protecting-against-bgp-hijacks-attacks-on-internet-architecture>

 

us: Federal Agencies Take Mitigating Steps To Protect Internet Infrastructure

A new report examines public agency practices to prevent the exploitation of vulnerabilities within the modern internet framework.

< <https://www.nextgov.com/cybersecurity/2022/03/federal-agencies-take-mitigating-steps-protect-internet-infrastructure/362788/> https://www.nextgov.com/cybersecurity/2022/03/federal-agencies-take-mitigating-steps-protect-internet-infrastructure/362788/>

 

us: Russia’s Cyber Tactics Are Prompting the FCC to Address Internet Routing Security

The Federal Communications Commission cited Russia’s aggression against Ukraine in announcing its unanimous approval of a notice of inquiry for secure use of the Border Gateway Protocol, the internet’s routing system.

< <https://www.nextgov.com/cybersecurity/2022/03/russias-cyber-tactics-are-prompting-fcc-address-internet-routing-security/362616/> https://www.nextgov.com/cybersecurity/2022/03/russias-cyber-tactics-are-prompting-fcc-address-internet-routing-security/362616/>

 

us: FCC looks into BGP vulnerabilities, in light of Russian hacking threat

The FCC is launching an inquiry into security issues surrounding the Border Gateway Protocol (BGP), a widely used standard used to manage interconnectivity between large portions of the Internet.

< <https://www.networkworld.com/article/3651516/fcc-looks-into-bgp-vulnerabilities-in-light-of-russian-hacking-threat.html> https://www.networkworld.com/article/3651516/fcc-looks-into-bgp-vulnerabilities-in-light-of-russian-hacking-threat.html>

 

Regulator Announces Border Gateway Protocol Security Review

Could a fundamental but poorly secured protocol that helps power the internet finally get needed improvements? ... There are ways to strengthen BGP to avoid these types of "unexplained" situations, including the Internet Engineering Task Force's Secure Inter-Domain Routing initiative, which is designed to create infrastructure that would allow an entity "to verifiably assert that it is the legitimate holder of a set of IP addresses or a set of Autonomous System (AS) numbers." But many organizations have yet to adopt this.

< <https://www.bankinfosecurity.com/blogs/regulator-announces-border-gateway-protocol-security-review-p-3198> https://www.bankinfosecurity.com/blogs/regulator-announces-border-gateway-protocol-security-review-p-3198>

 

us: FCC Launches Inquiry into Internet Routing Vulnerabilities

The Notice of Inquiry seeks comment on steps that the Commission should take to protect the nation's communications network from vulnerabilities posed by the Border Gateway Protocol

< <https://www.fcc.gov/document/fcc-launches-inquiry-internet-routing-vulnerabilities> https://www.fcc.gov/document/fcc-launches-inquiry-internet-routing-vulnerabilities>

 

GAO Identifies Risks to Key Internet Operations

A review by the Government Accountability Office (GAO) has identified risks to key internet operations. The internet is a vast system of interconnected networks used by billions of people. Its architecture is owned and governed by organizations around the world. No one organization is responsible for its policy, operation, or security.

< <https://www.hstoday.us/subject-matter-areas/cybersecurity/gao-identifies-risks-to-key-internet-operations/> https://www.hstoday.us/subject-matter-areas/cybersecurity/gao-identifies-risks-to-key-internet-operations/>

 

The Cybersecurity Implications Of The Russia-Ukraine Conflict

At this hour, the world is hurting in ways that people did not expect. The Ukrainian crisis has erupted into a significant conflict and whatever the ultimate outcome, the world will never be the same. As a company, we have employees, contractors and families that live in both the Ukraine and Russia. We are worried for their safety above all, as most are unable to leave. With the financial complications and sanctions, we now may not even be able to pay them. I know there are other companies and organizations trying to figure out what to do about their employees, partners, and the grave threats that they face. There is no doubt that the human cost will endure longer than the effects of artillery and we hope that cooler heads ultimately and quickly prevail, especially with the specter of a nuclear war now looming large.

< <https://www.forbes.com/sites/emilsayegh/2022/02/28/the-cybersecurity-implications-of-the-russia-ukraine-conflict/> https://www.forbes.com/sites/emilsayegh/2022/02/28/the-cybersecurity-implications-of-the-russia-ukraine-conflict/>

 

Internet Society Pulse: New Tools for a Deeper Understanding of the Internet

We spent 2021 developing Pulse’s content, building databases, and putting frameworks into place to further enrich it. We formed relationships with 21 new data partners to significantly enhance the amount of data presented. And, by the end of the year, we launched two new focus areas—Internet Centralization and Internet Resilience—to complement the Internet Shutdowns and Enabling Technologies focus areas.

< <https://www.internetsociety.org/blog/2022/02/internet-society-pulse-new-tools-for-a-deeper-understanding-of-the-internet/> https://www.internetsociety.org/blog/2022/02/internet-society-pulse-new-tools-for-a-deeper-understanding-of-the-internet/>

 

sg: Security Bulletin 2 Mar 2022

CVE-2021-3448: A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.

< <https://www.csa.gov.sg/en/singcert/Alerts/sb-2022-009> https://www.csa.gov.sg/en/singcert/Alerts/sb-2022-009>

 

IT professionals have sent out a letter to EU council warning them about the flaws in their new digital identity framework

Thirty-eight IT professionals around the globe have come together with EEF, which is a multinational NPO with the motive of promoting internet civil liberties. IT professionals have sent regulators of the European Union a letter warning them about a proposal that can expose people on the internet to cybercrime. ... Sites that have the use of Transport layer security certificates can assure security by encrypting the information shared between the user and the server’s end, hence exposing the owner’s identity.

< <https://www.digitalinformationworld.com/2022/03/it-professionals-have-sent-out-letter.html> https://www.digitalinformationworld.com/2022/03/it-professionals-have-sent-out-letter.html>

 

Decentralizing Cybersecurity Via DNS

Decentralization is a big trend in IT, and everyone has their own definition of what "decentralization" really means. With more organizations fully embracing a work-from-anywhere culture, decentralization has moved past being a fad and turned into a necessity. Decentralized cybersecurity is nothing new. Many of us have been doing it since before the pandemic.

< <https://circleid.com/posts/20220303-decentralizing-cybersecurity-via-dns> https://circleid.com/posts/20220303-decentralizing-cybersecurity-via-dns>

 

**********************

INTERNET OF THINGS

**********************

43% of businesses don’t protect their full IoT suite [news release]

A recent Kaspersky report, “Pushing the limits: How to address specific cybersecurity demands and protect IoT”, revealed that in two-in-five businesses (43%), some parts of their IoT infrastructure are yet to have any protection. Meanwhile, the main barrier for implementation of many businesses’ IoT projects is the risk of cybersecurity breaches and data compromises.

< <https://www.kaspersky.com/about/press-releases/2022_43-of-businesses-dont-protect-their-full-iot-suite> https://www.kaspersky.com/about/press-releases/2022_43-of-businesses-dont-protect-their-full-iot-suite>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

What’s the future of on-premises SharePoint?

... Other security updates include support for Open ID Connect, making it easier to integrate on-premises SharePoint with third-party authentication tools. This approach allows you to enforce multi-factor authentication. Using newer authentication protocols like this will help with using HTTP/2 and QUIC connections to the underlying web server, as it backs off to older protocols if you’re using older Windows tools like Kerberos or NTLM authentication.

< <https://www.techrepublic.com/article/whats-the-future-of-on-premises-sharepoint/> https://www.techrepublic.com/article/whats-the-future-of-on-premises-sharepoint/>

 

How does iCloud Private Relay work? Apple partner Cloudflare explains

... In this process, Cloudflare is one of the partners Apple is using for the “second relay.” The company explains that Cloudflare is “well suited” for this task because it “operates one of the largest, fastest networks in the world.” We’re also adept at building and working with modern encryption and transport protocols, including TLS 1.3 and QUIC. QUIC, and closely related MASQUE, are the technologies that enable Private Relay to efficiently move data between multiple relay hops without incurring performance penalties.

< <https://9to5mac.com/2022/03/02/how-does-icloud-private-relay-work-apple-partner-cloudflare-explains/> https://9to5mac.com/2022/03/02/how-does-icloud-private-relay-work-apple-partner-cloudflare-explains/>

 

Futuros sistemas Intel não devem ter compatibilidade com firmware de código aberto [Future Intel Systems Should Not Support Open Source Firmware ]

... Firewalld 1.1 lançado com novos serviços adicionados: Após o lançamento do Firewalld 1.0 , acaba de sair o Firewalld 1.1 como a próxima grande atualização deste daemon de firewall Linux. ... suporte HTTP/3 é facilmente exposto para abrir facilmente a porta UDP 443 para esta próxima iteração de HTTP usando QUIC como protocolo de transporte;

< <https://sempreupdate.com.br/futuros-sistemas-intel-nao-devem-ter-compatibilidade-com-firmware-de-codigo-aberto/> https://sempreupdate.com.br/futuros-sistemas-intel-nao-devem-ter-compatibilidade-com-firmware-de-codigo-aberto/>

 

**********************

OTHERWISE NOTEWORTHY

**********************

A new iron curtain is descending across Russia’s Internet

... Advocates of an open, globally connected Internet long have worried that a major country or region would break away from the Web amid geopolitical strife, dashing hopes of a seamless network capable of uniting a fractious world. ... Moscow’s censors on Friday banned Facebook and throttled other American social media services. Microsoft banned sales to Russians, following a similar move by Apple. And a leading American conduit of Internet data, Cogent Communications, severed ties with its Russian clients to prevent its networks from being used for propaganda or cyberattacks aimed at beleaguered Ukrainians.

< <https://www.washingtonpost.com/technology/2022/03/04/russia-ukraine-internet-cogent-cutoff/> https://www.washingtonpost.com/technology/2022/03/04/russia-ukraine-internet-cogent-cutoff/>

 

Internet backbone provider shuts off service in Russia

Cogent Communications, an internet backbone provider that routes data across intercontinental connections, has cut ties with Russian customers over its invasion of Ukraine, as first reported by The Washington Post. The US-based company is one of the world’s largest internet backbone providers and serves customers in 50 countries, including a number of high-profile Russian companies.

< <https://www.theverge.com/2022/3/5/22962822/internet-backbone-provider-cogent-shuts-off-service-russia> https://www.theverge.com/2022/3/5/22962822/internet-backbone-provider-cogent-shuts-off-service-russia>

 

Upholding a sustainable, resilient internet: what coalitions and solutions are needed?

The internet is a resilient network. During the pandemic, the internet’s underlying protocols and infrastructure were capable of handling skyrocketing demand and stress. However, in recent years, global internet has also been under growing threat from fragmentation. Competing visions for the future of the internet have led to an increased politicization of its technical architecture. At the international level, there is a widespread deficiency in trust and shared visions. And as a result, technical solutions for improving the internet’s resilience hold new weight, with higher stakes for prosperity, security and human rights around the world.

< <https://www.chathamhouse.org/events/all/research-event/upholding-sustainable-resilient-internet-what-coalitions-and-solutions> https://www.chathamhouse.org/events/all/research-event/upholding-sustainable-resilient-internet-what-coalitions-and-solutions>

 

Ukraine’s Plea to Unplug Russia From the Internet Is Denied

Following Ukraine’s request to essentially disconnect Russian websites from the internet, ICANN has responded explaining why they’re both unable and unwilling to take such unprecedented action.

< <https://www.rollingstone.com/politics/politics-news/ukraine-unplug-russia-internet-denied-icann-1315816/> https://www.rollingstone.com/politics/politics-news/ukraine-unplug-russia-internet-denied-icann-1315816/>

 

Letter from Göran Marby to Mykhailo Fedorov

Russia/Ukraine Conflict

< <https://www.icann.org/en/system/files/correspondence/marby-to-fedorov-02mar22-en.pdf> https://www.icann.org/en/system/files/correspondence/marby-to-fedorov-02mar22-en.pdf>

 

Letter from Mykhailo Fedorov, Deputy Prime Minister, Minister of Digital Transformation | Ministry of Digital Transformation of Ukraine, to Göran Marby

Russia/Ukraine Conflict

< <https://www.icann.org/en/system/files/correspondence/fedorov-to-marby-28feb22-en.pdf> https://www.icann.org/en/system/files/correspondence/fedorov-to-marby-28feb22-en.pdf>

 

Here’s a way ICANN could actually help the people of Ukraine

ICANN may have today decided to decline Ukraine’s request for Russian and Belarusian TLDs to be taken down, but there’s still at least one way it could do a little bit to help the country’s citizens.

< <https://domainincite.com/27606-heres-a-way-icann-could-actually-help-the-people-of-ukraine> https://domainincite.com/27606-heres-a-way-icann-could-actually-help-the-people-of-ukraine>

 

Ukraine Wants to Basically Kick Russia Off the Internet. Terrible Idea.

Many of the world’s most popular platforms and services have sought to stymie Russia’s information operations and propaganda amid its illegal invasion of Ukraine. Meta, Google, Twitter, TikTok, and others have de-platformed, de-monetized, and de-amplified Russian state media and official channels, making them official participants in the information war that they largely refused to wade into in the months and years leading up to the war on Ukraine.

< <https://slate.com/technology/2022/03/ukraine-kicking-russia-off-internet-icann.html> https://slate.com/technology/2022/03/ukraine-kicking-russia-off-internet-icann.html>

 

Wartime Is a Bad Time To Mess With the Internet

... But now the government of Ukraine has called on ICANN to disconnect Russia from the internet by revoking its TLDs, “.ru”, “.рф” and “.su” from the root zone, in an attempt to make access to Russian websites and email difficult for people outside as well as inside of Russia. Ukraine also reached out to RIPE, one of the five Regional Registries for Europe, the Middle East and parts of Central Asia, asking the organization to revoke IP address delegation to Russia.

< <https://www.eff.org/deeplinks/2022/03/wartime-bad-time-mess-internet> https://www.eff.org/deeplinks/2022/03/wartime-bad-time-mess-internet>

 

RIPE Reaffirms Neutral Stance

There have been calls from both inside Ukraine and within the broader RIPE community for RIPE NCC to "take action" against Russia in light of its unprovoked invasion of Ukraine. While this might seem like a "good idea", it's really not.

< <https://www.internetnews.me/2022/03/01/ripe-reaffirms-neutral-stance/> https://www.internetnews.me/2022/03/01/ripe-reaffirms-neutral-stance/>

 

RIPE NCC Executive Board Resolution on Provision of Critical Services

At its meeting on 28 February 2022, the RIPE NCC Executive Board approved a resolution on provision of critical services.

< <https://www.ripe.net/publications/news/announcements/ripe-ncc-executive-board-resolution-on-provision-of-critical-services> https://www.ripe.net/publications/news/announcements/ripe-ncc-executive-board-resolution-on-provision-of-critical-services>

 

Global Standards Symposium highlights key priorities for digital standardization

Digital leaders recognize that technical standards, built through patient, continuous collaboration, as key foundations to harness emerging technologies for the good of everyone on the planet.

< <https://www.itu.int/hub/2022/03/global-standards-symposium-priorities-digital-standardization/> https://www.itu.int/hub/2022/03/global-standards-symposium-priorities-digital-standardization/>

 

WTSA: Laying a solid foundation for our digital future

Today, I opened in Geneva the long-awaited World Telecommunication Standardization Assembly (WTSA) – a conference that will set the direction of the International Telecommunication Union (ITU) for the coming years in the crucial field of standardization.

< <https://www.itu.int/hub/2022/03/wtsa-standards-foundation-digital-future-houlin-zhao/> https://www.itu.int/hub/2022/03/wtsa-standards-foundation-digital-future-houlin-zhao/>

 

ITU members to set standardization agenda

The ITU will hold a press conference on 10 March at 13:30 CET to share the outcomes of a key global standardization assembly for digital technologies.

< <https://www.itu.int/en/mediacentre/Pages/MA-2022-03-01-WTSA-Press-Conference.aspx> https://www.itu.int/en/mediacentre/Pages/MA-2022-03-01-WTSA-Press-Conference.aspx>

 

Europe sets out 6G vision at Mobile World Congress Barcelona

At this year’s Mobile World Congress (MWC) Barcelona, Commissioner Breton addressed key representatives of the mobile industry in a video speech summarising Europe’s ambitious plans for technology and infrastructure investment to foster resilience and strengthen EU’s digital supply chain.

< <https://digital-strategy.ec.europa.eu/en/news/europe-sets-out-6g-vision-mobile-world-congress-barcelona> https://digital-strategy.ec.europa.eu/en/news/europe-sets-out-6g-vision-mobile-world-congress-barcelona>

 

ARPANET pioneer Jack Haverty says the internet was never finished

Early internet pioneer Jack Haverty has described the early structure of the internet as experimental – and said not much has changed since.

< <https://www.theregister.com/2022/03/01/the_internet_is_so_hard/> https://www.theregister.com/2022/03/01/the_internet_is_so_hard/>

 

David Boggs, Co-Inventor of Ethernet, Dies at 71

David Boggs, an electrical engineer and computer scientist who helped create Ethernet, the computer networking technology that connects PCs to printers, other devices and the internet in offices and homes, died on Feb. 19 in Palo Alto, Calif. He was 71.

< <https://www.nytimes.com/2022/02/28/technology/david-boggs-dead.html> https://www.nytimes.com/2022/02/28/technology/david-boggs-dead.html>

 

Vinton Cerf debuts at MWC2022 IPv6 Summit

How does IPv6 accelerate the release of connectivity potential and facilitate digital transformation?

< <https://developingtelecoms.com/telecom-business/videos-webinars/12986-vinton-cerf-debuts-at-mwc2022-ipv6-summit.html> https://developingtelecoms.com/telecom-business/videos-webinars/12986-vinton-cerf-debuts-at-mwc2022-ipv6-summit.html>

 

Decentralizing Cybersecurity Via DNS

Decentralization is a big trend in IT, and everyone has their own definition of what "decentralization" really means. With more organizations fully embracing a work-from-anywhere culture, decentralization has moved past being a fad and turned into a necessity. Decentralized cybersecurity is nothing new. Many of us have been doing it since before the pandemic.

< <https://circleid.com/posts/20220303-decentralizing-cybersecurity-via-dns> https://circleid.com/posts/20220303-decentralizing-cybersecurity-via-dns>

 

First Public Working Draft: MediaStreamTrack Insertable Media Processing using Streams

Diagram illustrating where Insertable Media Processing fits into the media pipeline, allowing to process video after its gets decoded and before it gets e.g. rendered; processing can be done with JavaScript, WebAssembly, WebGPU or WebNNThe Web Real-Time Communications Working Group has published a First Public Working Draft of MediaStreamTrack Insertable Media Processing using Streams. This JavaScript API allows to process raw video, either before it gets encoded or after it gets decoded, e.g. to add effects such as background blur to real-time video.

< <https://www.w3.org/> https://www.w3.org/>

 

First Public Working Drafts: VSSo and VSSo Core

The Automotive Working Group has published the following two First Public Working Drafts:

< <https://www.w3.org/> https://www.w3.org/>

 

CollapseUpdated W3C Recommendation: Verifiable Credentials Data Model v1.1

The Verifiable Credentials Working Group has just updated the W3C Recommendation of Verifiable Credentials Data Model v1.1.

< <https://www.w3.org/> https://www.w3.org/>

 

The election for the future of the internet

In September this year, UN member states will cast their votes for the next secretary-general of the ITU. While elections for bureaucratic positions in obscure, technical UN bodies normally pass unnoticed, the ITU has emerged as the major battleground in Russia and China’s fight for control of the internet. This election isn’t just a vote for the next secretary-general, it’s an election that will determine the future of cyberspace.

< <https://www.lowyinstitute.org/the-interpreter/election-future-internet> https://www.lowyinstitute.org/the-interpreter/election-future-internet>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home