[Newsclips] IETF SYN-ACK Newspack 2023-05-15

David Goldstein <david@goldsteinreport.com> Mon, 15 May 2023 09:40 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2BC8C1519A7 for <newsclips@ietfa.amsl.com>; Mon, 15 May 2023 02:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.084
X-Spam-Level:
X-Spam-Status: No, score=-2.084 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=goldsteinreport.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QNUuq7TGXzkL for <newsclips@ietfa.amsl.com>; Mon, 15 May 2023 02:40:28 -0700 (PDT)
Received: from mars.atomiclayer.com (mars.atomiclayer.com [66.85.142.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6278FC1519A9 for <newsclips@ietf.org>; Mon, 15 May 2023 02:40:28 -0700 (PDT)
Received: from David2019Desktop (unknown [144.136.5.199]) by mars.atomiclayer.com (Postfix) with ESMTPSA id C96C221F42B for <newsclips@ietf.org>; Mon, 15 May 2023 05:40:26 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=goldsteinreport.com; s=default; t=1684143627; bh=5ajS9/IPsxBeb5Y12fzzZe212+ZTUXk1/EkrG8pTfWg=; h=From:To:Subject; b=xNRVCaZejyR7w5YMsqvHcbC0UB+H9incAmCRPE5axHCjvTgFI8PnVJrhWKhxQr0vR Dvr6d8gjyfVd08dZfk0uc+ok2e8volUyPjH4oN4KZjx82ErWuyMj2N68XuLN8We8+y VZjem4tgwg6k04tA/rN9vLnczQOefMpMiTzH1xCg=
Authentication-Results: mars.atomiclayer.com; spf=pass (sender IP is 144.136.5.199) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (mars.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 15 May 2023 19:40:25 +1000
Message-ID: <00a901d98711$47dd75b0$d7986110$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00AA_01D98765.198DCB70"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdmHEUIZrr1aaqwHRkKtwNfo2hzp/g==
Content-Language: en-au
X-PPP-Message-ID: <168414362783.1327597.9648021944707939904@mars.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/aFBwlOvFuBOM57n1AvtK_mBWDIs>
Subject: [Newsclips] IETF SYN-ACK Newspack 2023-05-15
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 May 2023 09:40:33 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

NEWS FROM IETF PARTICIPANTS

**********************

DNS privacy vs… by Mallory Knodel

DNS privacy has become an increasingly important topic for online security and privacy. As the use of the Internet continues to grow, so does the amount of personal data being transmitted and collected through various online services.

< <https://blog.apnic.net/2023/05/09/dns-privacy-vs/> https://blog.apnic.net/2023/05/09/dns-privacy-vs/>

 

**********************

IETF IN THE NEWS

**********************

If Code Is Law, Then Protocols Are Good Manners That Help Us Get Along by Constance Bommelaer de Leusse 

... What are protocols and why are they important? Our online world is built on layers of networking protocols, complex sets of technical instructions and understandings about how to exchange information. The fundamental protocols that created the Internet and still make it work today are called the Internet Protocol and Transmission Control Protocol, or TCP/IP. These and other essential protocols are constantly updated by open standards bodies such as the IETF and the World Wide Web Consortium (W3C). To do their job well, protocols need to serve the communities that use them. Protocols are iterated over time by the communities that use them. Without constant improvement and updating—and the development of complementary protocols to do related tasks—protocols stop being useful.

< <https://circleid.com/posts/20230510-if-code-is-law-then-protocols-are-good-manners-that-help-us-get-along> https://circleid.com/posts/20230510-if-code-is-law-then-protocols-are-good-manners-that-help-us-get-along>

 

The New JavaScript Features Coming in ECMAScript 2023

... Although Temporal reached stage 3 in 2021, it’s been waiting for the IETF to standardize string formats used for calendar and time zone annotations. While there were hopes that it would be completed in 2022, it’s still in draft stage.

< <https://thenewstack.io/the-new-javascript-features-coming-in-ecmascript-2023/> https://thenewstack.io/the-new-javascript-features-coming-in-ecmascript-2023/>

 

NetSecOPEN Announces Publication of IETF RFC 9411: New RFC replaces RFC 3511, Benchmarking Methodology for Firewall Performance [news release]

NetSecOPEN ... is excited to announce the publication of Request for Comments (RFC) 9411 - Benchmarking Methodology for Network Security Device Performance. Authored by distinguished members of NetSecOPEN, this pivotal document provides comprehensive benchmarking terminology and methodology for next-generation network security devices, including next-generation firewalls (NGFWs) and next-generation intrusion prevention systems (NGIPSs).

< <https://www.netsecopen.org/> https://www.netsecopen.org/>

 

RKVST Instaproof adds transparency and traceability to data wherever it is stored

... Building on the principles of transparency and integrity coming from the distributed ledger space there are now several open standards efforts seeking to address the issue of trustworthy data including: the Coalition for Content Provenance and Authenticity (C2PA), Content Authenticity Initiative (CAI) and the IETF Supply Chain Integrity, Transparency and Trust (SCITT) Working Group.

< <https://www.helpnetsecurity.com/2023/05/11/rkvst-instaproof/> https://www.helpnetsecurity.com/2023/05/11/rkvst-instaproof/>

 

¿A quién le pertenece internet? [Who owns the internet?]

... Por si pareciera burocrático el asunto, internet es administrado por otras organizaciones y empresas internacionales que se encargan de mantener su infraestructura y establecer estándares técnicos. Entre ellas están, la IETF y la World Wide Web Consortium (W3C).

< <https://www.publimetro.com.mx/opinion/2023/05/12/a-quien-le-pertenece-internet-por-eduardo-navarrete/> https://www.publimetro.com.mx/opinion/2023/05/12/a-quien-le-pertenece-internet-por-eduardo-navarrete/>

 

DNS چیست و چکار می‌کند، نام‌ سایت‌ها چگونه به اعداد تبدیل می‌شوند [What is DNS and what does it do, how website names are converted into numbers]

در سال ۱۹۸۶، IETF، سیستم نام دامنه هایی را که به عنوان یکی از استانداردهای اصلی اینترنت بود را فهرست‌گذاری کرد. آن سازمان دو سند RFC 1035 و RFC 1034 را منتشر کرد که پروتکل سیستم نام دامنه را توصیف می‌کرد و انواع داده‌هایی را که می‌توانست حمل کند را مشخص می‌کرد.

< <https://peivast.com/p/162529> https://peivast.com/p/162529>

 

新华三持续攻关算网融合新技术,为行业构建云智原生的联接能力 [New H3C continues to tackle new technologies for computing and network integration to build cloud-native connectivity capabilities for the industry]

... APN6与SFC:面对行业应用场景的多元化,新华三积极参与IETF的APN6标准制定,逐渐成为ICT领域标准制定与推广的关键力量;同时,基于SRv6 SFC服务链应用,新华三在算力网络架构中引入安全资源池,实现从终端、网络、云到应用的一整套动态可视的安全服务链,使安全资源随着算力网络需求动态调配,实时生效。

< <https://finance.sina.com.cn/tech/roll/2023-05-10/doc-imythsmx9857817.shtml> https://finance.sina.com.cn/tech/roll/2023-05-10/doc-imythsmx9857817.shtml>

 

**********************

SECURITY & PRIVACY

**********************

ChatGPT is about to revolutionize cybersecurity

Unless you purposely avoid social media or the internet completely, you’ve likely heard about a new AI model called ChatGPT, which is currently open to the public for testing. This allows cybersecurity professionals like me to see how it might be useful to our industry.

< <https://venturebeat.com/security/chatgpt-is-about-to-revolutionize-cybersecurity/> https://venturebeat.com/security/chatgpt-is-about-to-revolutionize-cybersecurity/>

 

Cybersecurity faces a challenge from artificial intelligence’s rise: While defenders have been winning more battles, the availability of AI tools threatens that progress

Earlier this year, a sales director in India for tech security firm Zscaler got a call that seemed to be from the company’s chief executive. As his cellphone displayed founder Jay Chaudhry’s picture, a familiar voice said “Hi, it’s Jay. I need you to do something for me,” before the call dropped. A follow-up text over WhatsApp explained why. “I think I’m having poor network coverage as I am traveling at the moment. Is it okay to text here in the meantime?”

< <https://www.washingtonpost.com/technology/2023/05/11/hacking-ai-cybersecurity-future/> https://www.washingtonpost.com/technology/2023/05/11/hacking-ai-cybersecurity-future/>

 

Privacy and networking: Part 2 — Legal and ethical privacy

Given the arguments from the first article in this series, if privacy should be and is essential — what does the average network engineer do with this information? How does privacy impact network design and operations? To answer this question, we need to look at two other questions.

< <https://blog.apnic.net/2023/05/12/privacy-and-networking-part-2-legal-and-ethical-privacy/> https://blog.apnic.net/2023/05/12/privacy-and-networking-part-2-legal-and-ethical-privacy/>

 

BGP route leak prevention and detection with the help of RFC 9234

Route leaks can be accidental or malicious but most often they arise from accidental misconfiguration. By creating a route leak, the leaker becomes a link between different regions without obtaining income, but the main problem is not even the lost profit.

< <https://blog.apnic.net/2023/05/10/bgp-route-leak-prevention-and-detection-with-the-help-of-rfc-9234/> https://blog.apnic.net/2023/05/10/bgp-route-leak-prevention-and-detection-with-the-help-of-rfc-9234/>

 

Introducing ROAST Data for the MANRS Observatory 

The MANRS Observatory allows MANRS participants to understand how their routing security posture compares to others and provides information about current and past problems regarding some of the MANRS Actions that need to be fulfilled to be a MANRS participant in good standing.

< <https://www.manrs.org/2023/05/introducing-roast-data-for-the-manrs-observatory/> https://www.manrs.org/2023/05/introducing-roast-data-for-the-manrs-observatory/>

 

South Asia, Bangladesh leading Routing Completeness

This week, the 39th South Asian Network Operators Group conference, SANOG 39, is happening in Dhaka, Bangladesh.

< <https://www.manrs.org/2023/05/south-asia-bangladesh-leading-routing-completeness/> https://www.manrs.org/2023/05/south-asia-bangladesh-leading-routing-completeness/>

 

International security agencies warn of Russian “Snake” malware threat

Security agencies from five countries have issued a joint advisory revealing technical details about a sophisticated espionage tool used by Russian cyber actors against their targets. “Snake malware” and its variants have been a core component in Russian espionage operations carried out by Center 16 of Russia’s Federal Security Service (FSB) for nearly two decades, according to the security notice.

< <https://www.csoonline.com/article/3696169/international-security-agencies-warn-of-russian-snake-malware-threat.html> https://www.csoonline.com/article/3696169/international-security-agencies-warn-of-russian-snake-malware-threat.html>

 

FBI disrupts Russian hacking tool used to steal information from foreign governments 

The FBI announced Tuesday that it has disrupted a network of hacked computers that Russian spies have used for years to steal sensitive information from at least 50 countries, including NATO governments.

< <https://www.cnn.com/2023/05/09/politics/fbi-disrupts-russian-hacking-tool/index.html> https://www.cnn.com/2023/05/09/politics/fbi-disrupts-russian-hacking-tool/index.html>

< <https://www.msn.com/en-us/news/world/fbi-disrupts-russian-hacking-tool-used-to-steal-information-from-foreign-governments/ar-AA1aXeHD> https://www.msn.com/en-us/news/world/fbi-disrupts-russian-hacking-tool-used-to-steal-information-from-foreign-governments/ar-AA1aXeHD>

 

U.S. Says It Dismantled Russia’s ‘Most Sophisticated’ Malware Network

The United States and its allies have dismantled a major cyberespionage system that it said Russia’s intelligence service had used for years to spy on computers around the world, the Justice Department announced on Tuesday.

< <https://www.nytimes.com/2023/05/09/us/politics/fbi-russia-malware.html> https://www.nytimes.com/2023/05/09/us/politics/fbi-russia-malware.html>

 

Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia’s Federal Security Service

The Justice Department today announced the completion of a court-authorized operation, code-named MEDUSA, to disrupt a global peer-to-peer network of computers compromised by sophisticated malware, called “Snake”, that the U.S. Government attributes to a unit within Center 16 of the Federal Security Service of the Russian Federation (FSB). For nearly 20 years, this unit, referred to in court documents as “Turla,” has used versions of the Snake malware to steal sensitive documents from hundreds of computer systems in at least 50 countries, which have belonged to North Atlantic Treaty Organization (NATO) member governments, journalists, and other targets of interest to the Russian Federation. After stealing these documents, Turla exfiltrated them through a covert network of unwitting Snake-compromised computers in the United States and around the world.

< <https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-snake-malware-network-controlled> https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-snake-malware-network-controlled>

 

U.S. Agencies and Allies Partner to Identify Russian Snake Malware Infrastructure Worldwide

The National Security Agency (NSA) and several partner agencies have identified infrastructure for Snake malware—a sophisticated Russian cyberespionage tool—in over 50 countries worldwide.

< <https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3389044/us-agencies-and-allies-partner-to-identify-russian-snake-malware-infrastructure/> https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3389044/us-agencies-and-allies-partner-to-identify-russian-snake-malware-infrastructure/>

 

UK and allies expose Snake malware threat from Russian cyber actors

The UK and international allies have today (Tuesday) issued a joint advisory revealing technical details about a sophisticated espionage tool used by Russian cyber actors against their targets.

< <https://www.ncsc.gov.uk/news/uk-and-allies-expose-snake-malware-threat-from-russian-cyber-actors> https://www.ncsc.gov.uk/news/uk-and-allies-expose-snake-malware-threat-from-russian-cyber-actors>

 

us: The Attack on Colonial Pipeline: What We’ve Learned & What We’ve Done Over the Past Two Years

Today marks two years since a watershed moment in the short but turbulent history of cybersecurity. On May 7, 2021, a ransomware attack on Colonial Pipeline captured headlines around the world with pictures of snaking lines of cars at gas stations across the eastern seaboard and panicked Americans filling bags with fuel, fearful of not being able to get to work or get their kids to school. This was the moment when the vulnerability of our highly connected society became a nationwide reality and a kitchen table issue.

< <https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years> https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years>

 

Cybersecurity Competence Centre in Bucharest to provide Europe-wide Cyber Shield

The European Cybersecurity Competence Center (ECCC) was officially opened on Tuesday in Bucharest, the first European entity based in Romania to ensure the functioning of the EU-wide Cyber Shield.

< <https://www.euractiv.com/section/politics/news/cybersecurity-competence-centre-in-bucharest-to-provide-europe-wide-cyber-shield/> https://www.euractiv.com/section/politics/news/cybersecurity-competence-centre-in-bucharest-to-provide-europe-wide-cyber-shield/>

 

**********************

INTERNET OF THINGS

**********************

oneM2M IoT security specifications granted ITU approval

The ITU Telecommunication Standardization Sector (ITU-T) has approved a set of security specifications for internet of things (IoT) systems. The oneM2M specifications define a common set of IoT service functions to enable secure data exchange and information interoperability across different vertical sectors, service providers, and use cases. The specifications were approved by more than 190 countries and are now available for use by ITU-T member states.

< <https://www.csoonline.com/article/3695209/onem2m-iot-security-specifications-granted-itu-approval.html> https://www.csoonline.com/article/3695209/onem2m-iot-security-specifications-granted-itu-approval.html>

 

oneM2M specifications approved by more than 190 ITU member countries as ITU standard to simplify IoT adoption

More than 190 ITU-T member countries have approved oneM2M specifications as ITU standard, simplifying the IoT ecosystem lifecycle by minimizing development, deployment, and maintenance costs.

< <https://onem2m.org/iot-news/859-onem2m-specifications-approved-by-more-than-190-itu-member-countries-as-itu-standard-to-simplify-iot-adoption> https://onem2m.org/iot-news/859-onem2m-specifications-approved-by-more-than-190-itu-member-countries-as-itu-standard-to-simplify-iot-adoption>

 

Securing IoT Networks: NCCoE and CableLabs Collaborate to Develop Trusted Onboarding Solution

Billions of Internet of Things (IoT) devices have been added to the internet over the past several years. During that time, millions of insecure IoT devices have contributed to massive Distributed Denial of Services (DDoS) attacks, exposing end users’ private data.

< <https://www.cablelabs.com/blog/nccoe-and-cablelabs-collaborate-to-develop-trusted-onboarding-solution> https://www.cablelabs.com/blog/nccoe-and-cablelabs-collaborate-to-develop-trusted-onboarding-solution>

 

de: Urban Mobility: Interaction of IoT and Mobility for the Implementation of Mobility Solutions – Recap

At our Mobility Competence Group meeting,“Urban Mobility – Interaction of IoT and Mobility for the Implementation of Mobility Solutions”, eco entered into discussion with various experts from the mobility and IoT environment on the topics of data generation, data usage, data management and data policy. Together with our host, WOBCOM in Wolfsburg, and our CG Mobility Leader Giovanni Coppa, we arrived at exciting content and a highly productive CG meeting. A clear picture emerged of just how indispensable data usage is for mobility solutions in all areas. Various use cases were discussed, such as on smart parking, which plays an important role in the context of smart cities in order to minimise search for parking spaces in these cities. There were also exciting insights into the area of rescue mobility, not to mention the potential for data spaces and the shared use of (mobility) data.

< <https://international.eco.de/news/urban-mobility-interaction-of-iot-and-mobility-for-the-implementation-of-mobility-solutions-recap/> https://international.eco.de/news/urban-mobility-interaction-of-iot-and-mobility-for-the-implementation-of-mobility-solutions-recap/>

 

The Internet of Things: Fire Sleuth, Fire Starter: IoT devices can witness how fires started, but there are doubts about the integrity of their evidence

Fires are difficult to investigate since they often destroy the evidence of their cause. Now scientists demonstrate how Internet of Things (IoT) gadgets can reveal key clues—but also potentially help arsonists start fires in the first place.

< <https://spectrum.ieee.org/iot-for-arson-forensics> https://spectrum.ieee.org/iot-for-arson-forensics>

 

How the Internet of Things Will Clear the Road for Electric Vehicles

Automakers are losing billions of dollars on electric vehicle (EV) investments. Industry executives are reasonably less than bullish about their prospects. Most car buyers prefer gas-powered vehicles.

< <https://www.iotevolutionworld.com/iot/articles/455806-how-internet-things-will-clear-road-electric-vehicles.htm> https://www.iotevolutionworld.com/iot/articles/455806-how-internet-things-will-clear-road-electric-vehicles.htm>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

The Internet Twenty-Five Years Later by Geoff Huston

... The second initiative, which for me is a fundamental change in transport capabilities and functions, is the introduction of the QUIC protocol. At its simplest level you could say QUIC is a packaging of the combination TCP and TLS into a UDP wrapping. However, I would suggest that such a description is well short of the mark.

< <https://www.potaroo.net/ispcol/2023-04/25y.html> https://www.potaroo.net/ispcol/2023-04/25y.html>

 

DNS Encryption Protocols Explained: Which Best Protects Your Web Traffic?

...  4. DNS-over-QUIC: Compared to the other DNS encryption protocols on this list, DNS-over-QUIC (DoQ) is fairly new. It is an emerging security protocol that sends DNS queries and responses over the QUIC (Quick UDP Internet Connections) transport protocol.

< <https://www.makeuseof.com/dns-encryption-protocols-explained/> https://www.makeuseof.com/dns-encryption-protocols-explained/>

< <https://www.msn.com/en-us/news/technology/dns-encryption-protocols-explained-which-best-protects-your-web-traffic/ar-AA1b43dv> https://www.msn.com/en-us/news/technology/dns-encryption-protocols-explained-which-best-protects-your-web-traffic/ar-AA1b43dv>

 

**********************

OTHERWISE NOTEWORTHY

**********************

Here’s how IBM’s quantum safe technology secures tomorrow

IBM once made headlines by creating the world’s largest quantum computer, boasting 433 qubits, a technology capable of performing quantum computations far beyond the reach of any classical computer.

< <https://techwireasia.com/2023/05/heres-how-ibms-quantum-safe-technology-secures-tomorrow/> https://techwireasia.com/2023/05/heres-how-ibms-quantum-safe-technology-secures-tomorrow/>

 

IBM Unveils End-to-End Quantum-Safe Technology to Safeguard Governments' and Businesses' Most-Valuable Data

IBM today announced at its annual Think conference in Orlando, Florida, new IBM Quantum Safe technology: a comprehensive set of tools and capabilities, combined with IBM's deep security expertise, designed as an end-to-end solution to be made available as organizations, including governmental agencies, prepare their quantum-safe journey towards the post-quantum era.

< <https://newsroom.ibm.com/2023-05-10-IBM-Unveils-End-to-End-Quantum-Safe-Technology-to-Safeguard-Governments-and-Businesses-Most-Valuable-Data> https://newsroom.ibm.com/2023-05-10-IBM-Unveils-End-to-End-Quantum-Safe-Technology-to-Safeguard-Governments-and-Businesses-Most-Valuable-Data>

 

How IBM Quantum is bringing organizations along their quantum-safe technology journey

At this year’s Think event, the premier IBM conference for business and technology leaders, we announced our quantum-safe roadmap, and how we plan to use technology to equip industries with the cybersecurity capabilities required for this new era. Supporting that roadmap is IBM Quantum Safe technology: a comprehensive set of tools, capabilities, and approaches combined with deep expertise for an end-to-end journey to make your organization quantum safe. We’re excited to present our IBM Quantum Safe Roadmap — and launch the era of quantum safe.

< <https://research.ibm.com/blog/quantum-safe-roadmap> https://research.ibm.com/blog/quantum-safe-roadmap>

 

If Code Is Law, Then Protocols Are Good Manners That Help Us Get Along

The Decentralized Social Networking Protocol (DSNP) is a product developed by Project Liberty, an international non-profit founded by Frank McCourt, with the goal of transforming how the Internet works, who owns and controls personal data, and who benefits from the digital economy. The McCourt Institute, as the research and digital governance arm of Project Liberty, aims to support the development and management of DSNP.

< <https://circleid.com/posts/20230510-if-code-is-law-then-protocols-are-good-manners-that-help-us-get-along> https://circleid.com/posts/20230510-if-code-is-law-then-protocols-are-good-manners-that-help-us-get-along>

 

The Internet as a public utility by Geoff Huston

I recently attended a workshop on the topic of Lessons Learned from 40+ Years of the Internet, and the topic of the Internet as a public utility in the context of national regulatory frameworks came up. For me, 40 years is just enough time to try and phrase an answer to the big policy question — has the Internet been a success in the experiment of using market forces to act as an efficient distributor of public goods? Or has it raised more issues than it has addressed?

< <https://blog.apnic.net/2023/05/08/the-internet-as-a-public-utility/> https://blog.apnic.net/2023/05/08/the-internet-as-a-public-utility/>

 

The APC network intervenes at the Global Digital Compact's deep dive session on human rights online

The Global Digital Compact (GDC) is an opportunity for civil society to contribute to establishing agreed principles for digital governance that support human rights, social justice and sustainable development and that can form the basis of a longer-term framework for accountable and inclusive internet governance – and broader digital governance. Part of the process of drafting the GDC is a series of thematic deep dive sessions held from March to June 2023.

< <https://www.apc.org/en/news/apc-network-intervenes-global-digital-compacts-deep-dive-session-human-rights-online> https://www.apc.org/en/news/apc-network-intervenes-global-digital-compacts-deep-dive-session-human-rights-online>

 

Global Digital Compact must be guided by human rights: Statement by Volker Türk, UN High Commissioner for Human Rights

Distinguished delegates, Colleagues, Thirty years ago, in 1993, the Internet was only just beginning to transform our world. This felt like a once-in-a-century breakthrough. We could not have predicted, then, a future where pivotal tech advances are an almost daily occurrence.

< <https://www.ohchr.org/en/statements/2023/05/global-digital-compact-must-be-guided-human-rights-says-turk> https://www.ohchr.org/en/statements/2023/05/global-digital-compact-must-be-guided-human-rights-says-turk>

 

AI pioneer Geoffrey Hinton says AI is a new form of intelligence unlike our own. Have we been getting it wrong this whole time?

Debates about AI often characterise it as a technology that has come to compete with human intelligence. Indeed, one of the most widely pronounced fears is that AI may achieve human-like intelligence and render humans obsolete in the process. However, one of the world’s top AI scientists is now describing AI as a new form of intelligence – one that poses unique risks, and will therefore require unique solutions.

< <https://www.csiro.au/en/news/All/Articles/2023/May/geoffrey-hinton-ai> https://www.csiro.au/en/news/All/Articles/2023/May/geoffrey-hinton-ai>

 

The Internet as a public utility by Geoff Huston

I recently attended a workshop on the topic of Lessons Learned from 40+ Years of the Internet, and the topic of the Internet as a public utility in the context of national regulatory frameworks came up. For me, 40 years is just enough time to try and phrase an answer to the big policy question — has the Internet been a success in the experiment of using market forces to act as an efficient distributor of public goods? Or has it raised more issues than it has addressed?

< <https://blog.apnic.net/2023/05/08/the-internet-as-a-public-utility/> https://blog.apnic.net/2023/05/08/the-internet-as-a-public-utility/>

 

OB-UDPST paving the way for greater speed and latency measurement

Broadband networks are being pushed to their limits, with ultra-fast connectivity no longer just a lofty aspiration, but a necessity for users to truly unlock the full potential of their connected homes.

< <https://www.broadband-forum.org/ob-udpst-paving-the-way-for-greater-speed-and-latency-measurement> https://www.broadband-forum.org/ob-udpst-paving-the-way-for-greater-speed-and-latency-measurement>

 

CableLabs touts progress on 100-Gig CPON tech

CableLabs is making progress in its pursuit of new 100 Gbit/s coherent PON (CPON) technology following the publishing of an initial set of specs that define an architecture and a wide range of use cases for broadband operators. But the commercial readiness of single wavelength CPON products is likely a few years out on the horizon.

< <https://www.lightreading.com/broadband/cablelabs-touts-progress-on-100-gig-cpon-tech/d/d-id/784825> https://www.lightreading.com/broadband/cablelabs-touts-progress-on-100-gig-cpon-tech/d/d-id/784825>

 

us: Congress eyes new rules for tech: What’s under consideration

Most Democrats and Republicans agree that the federal government should better regulate the biggest technology companies, particularly social media platforms. But there is very little consensus on how it should be done.

< <https://apnews.com/article/congress-technology-regulation-tiktok-155d696fd44a450a43ce8cb9802e40bb> https://apnews.com/article/congress-technology-regulation-tiktok-155d696fd44a450a43ce8cb9802e40bb>

 

**********************

GOOGLE/APPLE/TRACKING

**********************

Apple And Google Team Up To Stop Unwanted AirTag Tracking

... The specification has been submitted as an Internet-Draft via standards development organization the IETF. Apple and Google have invited interested parties to review and comment over the next three months.

< <https://www.forbes.com/sites/kateoflahertyuk/2023/05/08/apple-and-google-team-up-to-stop-unwanted-airtag-tracking/?sh=5de5dff33648> https://www.forbes.com/sites/kateoflahertyuk/2023/05/08/apple-and-google-team-up-to-stop-unwanted-airtag-tracking/?sh=5de5dff33648>

 

Google updates Find My Device network, adds new feature to warn about unknown AirTags with you

... Their draft had been submitted as an Internet-Draft via a standards development organization, the IETF. Other interested parties were invited to review and comment over the next few months.

< <https://techcrunch.com/2023/05/10/googles-find-my-device-network-to-warn-about-unknown-airtags-with-you/> https://techcrunch.com/2023/05/10/googles-find-my-device-network-to-warn-about-unknown-airtags-with-you/>

 

This Week in Apps: Apple and Google team up on trackers, Google I/O preview, apps hit NewFronts

... The companies submitted a proposed specification as an Internet-Draft via a standards development organization, the IETF. Other interested parties are now being invited to review and comment over the next three months. After this time, Apple and Google will offer feedback and will release a production implementation of the specification by year’s end that will be supported in future versions of iOS and Android, they said.

< <https://techcrunch.com/2023/05/06/this-week-in-apps-apple-and-google-team-up-on-trackers-google-i-o-preview-apps-hit-newfronts/> https://techcrunch.com/2023/05/06/this-week-in-apps-apple-and-google-team-up-on-trackers-google-i-o-preview-apps-hit-newfronts/>

 

AirTag in the News: NYPD Recommends, Apple and Google Propose Industry Tracking Standard

... In an acknowledgment that tracking technology can be used for stalking, Apple and Google released a draft of a proposed industry specification via the well-accepted IETF process. With the blunt title “Detecting Unwanted Location Trackers,” the spec stakes out the problem territory in a technical way and suggests how to provide significant minimum rules that all devices complying with the standard would have to support.

< <https://tidbits.com/2023/05/08/airtag-in-the-news-nypd-recommends-apple-and-google-propose-industry-tracking-standard/> https://tidbits.com/2023/05/08/airtag-in-the-news-nypd-recommends-apple-and-google-propose-industry-tracking-standard/>

 

Google Wants to Make It Harder for Bad Actors to Track You. Here's How

... Google's update on the new alert comes after the search giant teamed up with rival Apple on an initiative to prevent misuse of location-tracking devices like Apple's AirTag. Earlier this month, the companies submitted a draft set of standards and best practices for the tech industry to the IETF.

< <https://www.cnet.com/tech/google-wants-to-make-it-harder-for-bad-actors-to-track-you-heres-how/> https://www.cnet.com/tech/google-wants-to-make-it-harder-for-bad-actors-to-track-you-heres-how/>

 

Google & Apple are teaming up to combat unwanted tracking via AirTags

... Although Google and Apple have submitted the proposed specification to the IETF as an Internet-Draft, they are seeking input from other industry participants and advocacy groups to develop the tracking standard. Moreover, other Bluetooth tracker manufacturers like Samsung, Tile, Chipolo, Eufy Security, and Pebblebee have expressed their interest in the draft.

< <https://www.androidheadlines.com/2023/05/google-apple-teaming-up-to-combat-unwanted-tracking-airtags.html> https://www.androidheadlines.com/2023/05/google-apple-teaming-up-to-combat-unwanted-tracking-airtags.html>

< <https://www.msn.com/en-us/news/technology/google-apple-are-teaming-up-to-combat-unwanted-tracking-via-airtags/ar-AA1aTAy7> https://www.msn.com/en-us/news/technology/google-apple-are-teaming-up-to-combat-unwanted-tracking-via-airtags/ar-AA1aTAy7>

 

Tech majors Apple and Google lead initiative for an industry specification to address unwanted tracking

... The specification has been submitted as an Internet-Draft via the IETF, a leading standards development organisation. Interested parties are invited and encouraged to review and comment over the next three months.

< <https://www.indiablooms.com/life-details/TECH/7201/tech-majors-apple-and-google-lead-initiative-for-an-industry-specification-to-address-unwanted-tracking.html> https://www.indiablooms.com/life-details/TECH/7201/tech-majors-apple-and-google-lead-initiative-for-an-industry-specification-to-address-unwanted-tracking.html>

 

Apple et Google s’unissent contre cette grave menace pour votre vie privée [Apple and Google unite against this serious threat to your privacy]

... Néanmoins, cette norme en cours de développement viendra réduire efficacement le harcèlement. Les entreprises instigatrices ont déjà déposé le projet auprès de l’IETF. Cet organisme international est chargé de « produire des documents techniques et d’ingénierie pertinents et de haute qualité qui influencent la façon dont les gens conçoivent, utilisent et gèrent Internet de manière à améliorer le fonctionnement d’Internet ».

< <https://www.lebigdata.fr/apple-google-vie-privee> https://www.lebigdata.fr/apple-google-vie-privee>

 

Le coup de gueule d'un cadre de Google à l'encontre d'Apple concernant le protocole de messagerie RCS entre l'iPhone et Android [The rant of a Google executive against Apple concerning the RCS messaging protocol between the iPhone and Android]

... Le sous-système multimédia IP est un cadre de réseau permettant d'acheminer le trafic multimédia, principalement conçu dans le cadre du projet de partenariat de troisième génération (3GPP). Le sous-système multimédia IP est basé sur les protocoles SIP du 3GPP et IP de l'IETF. L'IMS permet de contrôler et de facturer les services fournis par l'opérateur de réseau/fournisseur de services. Le cadre de l'IMS est la migration des SC, des circuits du réseau de domaine fermé vers les paquets IP du réseau de domaine fermé et est donc considéré comme un réseau tout IP.

< <https://www.developpez.com/actu/344463/Le-coup-de-gueule-d-un-cadre-de-Google-a-l-encontre-d-Apple-concernant-le-protocole-de-messagerie-RCS-entre-l-iPhone-et-Android-a-suscite-des-applaudissements-lors-d-une-conference/> https://www.developpez.com/actu/344463/Le-coup-de-gueule-d-un-cadre-de-Google-a-l-encontre-d-Apple-concernant-le-protocole-de-messagerie-RCS-entre-l-iPhone-et-Android-a-suscite-des-applaudissements-lors-d-une-conference/>

 

Apple und Google kooperieren: Industriestandard gegen unerwünschtes Tracking geplant [Apple and Google cooperate: industry standard planned against unwanted tracking]

... Die Spezifikation ist als Entwurf über die IETF, eine führende Organisation für die Entwicklung von Standards, im Internet eingereicht worden.

< <https://www.macgadget.de/index.php/News/2023/05/08/Apple-und-Google-kooperieren-Industriestandard-gegen-unerwuenschtes-Tracking> https://www.macgadget.de/index.php/News/2023/05/08/Apple-und-Google-kooperieren-Industriestandard-gegen-unerwuenschtes-Tracking>

 

Da questa estate Android rileverà automaticamente gli AirTags indesiderati [From this summer Android will automatically detect unwanted AirTags]

... La specifica è stata presentata come Internet Draft attraverso l’IETF, un’organizzazione leader nello sviluppo di standard. Le parti interessate sono invitate e incoraggiate a esaminare e commentare la specifica nei prossimi tre mesi. Dopo il periodo di commento, Apple e Google collaboreranno per gestire il feedback e, entro la fine del 2023, rilasceranno una versione di produzione della specifica per gli avvisi di tracciamento indesiderato, che sarà poi supportata nelle future versioni di iOS e Android.

< <https://www.macitynet.it/tracciamenti-indesiderati-airtag/> https://www.macitynet.it/tracciamenti-indesiderati-airtag/>

 

Apple e Google si uniscono per un obiettivo comune: a cosa stanno lavorando [Apple and Google come together for a common goal: what they are working on]

... I tracker Bluetooth sono spesso utilizzati per monitorare gli spostamenti delle persone senza il loro consenso, una pratica che può essere molto preoccupante per la privacy delle persone. Per contrastare questo fenomeno, Google e Apple stanno lavorando insieme per sviluppare una proposta di specifica per proteggere i dati degli utenti. La proposta è stata recentemente presentata all’IETF, l’organizzazione che sviluppa standard per Internet, e prevede l’utilizzo di tecniche di crittografia per proteggere i dati degli utenti durante la comunicazione Bluetooth.

< <https://www.cellulari.it/apple-e-google-si-uniscono-per-un-obiettivo-comune-a-cosa-stanno-lavorando/> https://www.cellulari.it/apple-e-google-si-uniscono-per-un-obiettivo-comune-a-cosa-stanno-lavorando/>

 

Apple e Google se unem para impedir rastreamento indesejado de AirTags [Apple and Google team up to prevent unwanted AirTags tracking]

... A especificação foi submetida como um Rascunho da Internet por meio da organização de desenvolvimento de padrões, a IETF. A Apple e o Google convidaram as partes interessadas a revisar e comentar nos próximos três meses.

< <https://forbes.com.br/forbes-tech/2023/05/apple-e-google-se-unem-para-impedir-rastreamento-indesejado-de-airtag/> https://forbes.com.br/forbes-tech/2023/05/apple-e-google-se-unem-para-impedir-rastreamento-indesejado-de-airtag/>

 

Összefog két nagy rivális, az Apple és a Google, hogy ne lehessen könnyen követni a kütyüket, amiket követésre találtak ki [Two big rivals, Apple and Google, join forces to make it impossible to easily track gadgets designed to track]

... A specifikációt internetes tervezetként nyújtották be az IETF szabványfejlesztő szervezeten keresztül. A specifikáció három hónapig nyitva áll a külső felek általi áttekintésre és megjegyzésekre, ezt követően az Apple és a Google foglalkozik a visszajelzésekkel, és ezeknek megfelelően kiigazítja. A specifikáció megvalósítása 2023 végére várható, amelyet ezután az iOS és az Android jövőbeli kiadásai is támogatni fognak.

< <https://hvg.hu/tudomany/20230510_apple_google_kozos_szabvany_airtag_nyomkovetok_kovetese_ietf> https://hvg.hu/tudomany/20230510_apple_google_kozos_szabvany_airtag_nyomkovetok_kovetese_ietf>

 

Πώς η Google και η Apple βάζουν τέλος στις κλοπές [How Google and Apple are putting an end to theft]

... Οι προδιαγραφές έχουν υποβληθεί μέσω του IETF και υπόκεινται σε περίοδο σχολιασμού για τρεις μήνες. Μετά από αυτή την περίοδο, οι εταιρείες θα συνεργαστούν -με βάση τα σχόλια και την κριτική που έλαβαν- και θα εφαρμόσουν τις εν λόγω προδιαγραφέςμέχρι το τέλος του τρέχοντος έτους. Αυτές, στη συνέχεια θα υποστηρίζονται σε μελλοντικές εκδόσεις Android και iOS.

< <https://www.24sports.com.cy/gr/tech/pws-i-google-kai-i-apple-bazoyn-telos-stis-klopes> https://www.24sports.com.cy/gr/tech/pws-i-google-kai-i-apple-bazoyn-telos-stis-klopes>

 

追跡タグを悪用したストーカー被害撲滅へ、アップルとグーグルが協力 [Apple and Google work together to eradicate stalking victims using tracking tags]

... アップルとグーグルは5月2日、ストーカー行為などに使われている追跡タグを発見しやすくするための技術の仕様案を、インターネット技術の標準化団体であるIETFを通じて公表した。両社は、3カ月にわたって意見を募り、集約した意見を反映させ、2023年末までにアップルのiOSやグーグルのアンドロイドに組み込むとしている。

< <https://news.yahoo.co.jp/articles/361b66375e169a64124925653cdafc07eb3619af> https://news.yahoo.co.jp/articles/361b66375e169a64124925653cdafc07eb3619af>

 

Apple hợp tác cùng Google ngăn chặn theo dõi vị trí từ các thiết bị trái phép [Apple works with Google to prevent location tracking from unauthorized devices]

... Các nội dung liên quan cũng được hai công ty gửi lên tổ chức phát triển tiêu chuẩn IETF. Trong ba tháng tới, các bên quan tâm sẽ xem xét, đánh giá tài liệu và cân nhắc chi tiết của bản tiêu chuẩn.

< <https://vnmedia.vn/cong-nghe/202305/apple-hop-tac-cung-google-ngan-chan-theo-doi-vi-tri-tu-cac-thiet-bi-trai-phep-ec66e29/> https://vnmedia.vn/cong-nghe/202305/apple-hop-tac-cung-google-ngan-chan-theo-doi-vi-tri-tu-cac-thiet-bi-trai-phep-ec66e29/>

 

Apple與Google合作領銜制定產業規範!出現疑似不明追蹤時提醒使用者幫助打擊iOS和Android平台上的不明追蹤 [Apple partners with Google to lead the development of industry norms! Alert users to help combat unidentified tracking on iOS and Android when suspected tracking occurs]

... 該規範已透過頂尖的標準制定組織網際網路工程任務組( IETF),以網際網路草案的形式提交。公司邀請並鼓勵感興趣的各方在接下來三個月期間針對該草案進行檢視與評論。評論期結束後,Apple和Google將合作處理回饋意見,並將於2023年底前發布不必要追蹤警報規範的生產實施辦法,隨後iOS和Android的後續版本將支援該規範。

< <https://zeekmagazine.com/archives/200869> https://zeekmagazine.com/archives/200869>

 

防堵AirTag等追蹤設備引犯罪,蘋果找來Google!雙方怎麽聯手解決? [To prevent tracking devices such as AirTag from causing crime, Apple found Google! How can the two sides join forces to solve it?]

... Apple表示,這項標準已經通過IETF以網路草案的形式呈交並徵集意見,最早會在2023年底公布相關規範和具體實施方式。

< <https://www.bnext.com.tw/article/75205/airtag-apple> https://www.bnext.com.tw/article/75205/airtag-apple>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home