[Newsclips] IETF SYN-ACK Newspack 2023-05-29

David Goldstein <david@goldsteinreport.com> Mon, 29 May 2023 03:31 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 712CDC14CE55 for <newsclips@ietfa.amsl.com>; Sun, 28 May 2023 20:31:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.915
X-Spam-Level:
X-Spam-Status: No, score=0.915 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, GB_RUURL=3, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=goldsteinreport.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1EJsg-78tzJA for <newsclips@ietfa.amsl.com>; Sun, 28 May 2023 20:31:23 -0700 (PDT)
Received: from mars.atomiclayer.com (mars.atomiclayer.com [66.85.142.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8F5AC151076 for <newsclips@ietf.org>; Sun, 28 May 2023 20:31:23 -0700 (PDT)
Received: from David2019Desktop (unknown [144.136.5.199]) by mars.atomiclayer.com (Postfix) with ESMTPSA id C38C37B75E3 for <newsclips@ietf.org>; Sun, 28 May 2023 23:31:21 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=goldsteinreport.com; s=default; t=1685331082; bh=YkXbgYRzkGRWcVN6harfoCGl/Gc+fz1ODs+UQN1FaTA=; h=From:To:Subject; b=WHtZJNm6HdaxcQZCJcIYxq8FBmSiKOPAdEMTg5qy63eeIJYShsWXKdZhHMx3W3LF0 zMWG2qvtH80sOEL2cfjwvLzFdqtW8bTg8nYbJG1GNsxEmnaX+LnwLA0kd78w893wPy JC46bk1HvjFydkHJTaDlbvJFqaAvseipj4OLQvQA=
Authentication-Results: mars.atomiclayer.com; spf=pass (sender IP is 144.136.5.199) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (mars.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 29 May 2023 13:31:20 +1000
Message-ID: <008a01d991de$0a45bcd0$1ed13670$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_008B_01D99231.DBF50120"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdmR3gUHFqVadUyHRrizQvIvIGOphw==
Content-Language: en-au
X-PPP-Message-ID: <168533108280.749329.17428520278277626239@mars.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/hJM_6KvPr0J58A8DWSYAdNPdaKc>
Subject: [Newsclips] IETF SYN-ACK Newspack 2023-05-29
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 May 2023 03:31:28 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Standards must come together, with latency as the cornerstone

Standards Development Organizations (SDOs), including Broadband Forum, IETF, and IEEE are concentrating on specifications for measuring metrics of network performance. Broadband Forum’s Broadband Quality Experience Delivered (Broadband QED), uses Quality Attenuation methods  to look beyond conventional measurements, such as Quality of Service (QoS). This initiative helps optimize networks and deliver greater Quality of Experience (QoE) to the end-user by analyzing the performance of different network segments including latency, consistency, predictability, and reliability.

< <https://www.broadband-forum.org/standards-must-come-together-with-latency-as-the-cornerstone> https://www.broadband-forum.org/standards-must-come-together-with-latency-as-the-cornerstone>

 

Failed Expectations: A Deep Dive Into the Internet’s 40 Years of Evolution

In a recent workshop, I attended, reflecting on the evolution of the Internet over the past 40 years, one of the takeaways for me is how we've managed to surprise ourselves in both the unanticipated successes we've encountered and in the instances of failure when technology has stubbornly resisted to be deployed despite our confident expectations to the contrary! What have we learned from these lessons about our inability to predict technology outcomes? ... With this recasting of expectations for the Internet, the effort in the evolution of the underlying IP protocol suite was coordinated through the IETF. Vendors, corporates and researchers were not following their own directions, and, at least in North America the common effort was loosely coordinated in the IETF.

< <https://www.potaroo.net/ispcol/2023-05/FailedExpectations.html> https://www.potaroo.net/ispcol/2023-05/FailedExpectations.html>

< <https://circleid.com/posts/20230524-failed-expectations-a-deep-dive-into-the-internets-40-years-of-evolution> https://circleid.com/posts/20230524-failed-expectations-a-deep-dive-into-the-internets-40-years-of-evolution>

 

Failed expectations by Geoff Huston

In a recent workshop I attended reflecting on the evolution of the Internet over the past 40 years, one of the takeaways for me is how we’ve managed to surprise ourselves in both the unanticipated successes we’ve encountered and in the instances of failure when technology has stubbornly resisted to be deployed despite our confident expectations to the contrary! ... With this recasting of expectations for the Internet, the effort in the evolution of the underlying IP protocol suite was coordinated through the IETF. Vendors, corporates, and researchers were not following their own directions, and, at least in North America, the common effort was loosely coordinated in the IETF.

< <https://blog.apnic.net/2023/05/24/failed-expectations/> https://blog.apnic.net/2023/05/24/failed-expectations/>

 

G7 leaders warn of AI dangers, say the time to act is now

... “Regulators should set timeframes by which AI model vendors must use standards to authenticate provenance of content, software, and other digital assets used in their systems. See standards from C2PA, Scitt.io, IETF for examples,” Litan said.

< <https://www.computerworld.com/article/3697154/g7-leaders-warn-of-ai-dangers-say-the-time-to-act-is-now.html> https://www.computerworld.com/article/3697154/g7-leaders-warn-of-ai-dangers-say-the-time-to-act-is-now.html>

 

Google Cloud Users Can Now Automate TLS Certificate Lifecycle

... To enhance the certificate ecosystem, the internet giant also announced the ACME Renewal Information (ARI) standard for renewal management and the general availability of multi-perspective domain validation (MPDV), for an enhanced certificate issuance process. An IETF draft authored by Let’s Encrypt, ARI is an extension to the ACME protocol that helps renew certificates if revocation occurs before expiration.

< <https://www.securityweek.com/google-cloud-users-can-now-automate-tls-certificate-lifecycle/> https://www.securityweek.com/google-cloud-users-can-now-automate-tls-certificate-lifecycle/>

 

How does Post-Quantum Cryptography affect the TLS protocol?

The emerging threat of quantum computers changes the way we look at and implement communications security of today. How can Post-Quantum Cryptography (PQC) be used for protecting the widely used TLS 1.3 protocol? ... The history of TLS dates back to the 1990s. It was developed by Netscape Communications and was originally called Secure Sockets Layer (SSL). TLS 1.0 was released as RFC 2246 by the IETF in 1999.

< <https://www.design-reuse.com/industryexpertblogs/54083/how-does-post-quantum-cryptography-affect-the-tls-protocol.html> https://www.design-reuse.com/industryexpertblogs/54083/how-does-post-quantum-cryptography-affect-the-tls-protocol.html>

 

#CRESTCon: Jon Geater Discusses Latest Supply Chain Security Best Practices

... During his keynote speech on May 18, Jon Geater, co-chair of the IETF's Supply Chain Integrity, Transparency and Trust (SCITT) working group, reminded the audience that software supply chain attacks soared 742% between 2019 and 2022.

< <https://www.infosecurity-magazine.com/interviews/crestcon-jon-geater-supply-chain/> https://www.infosecurity-magazine.com/interviews/crestcon-jon-geater-supply-chain/>

 

Huawei joins Cybersecurity thought leaders across the Middle East and Central Asia

... NESAS/SCAS is an ideal example of global collaborative efforts in addressing cybersecurity. It offers a standardized cybersecurity assessment mechanism jointly defined by GSMA and 3GPP, the telecom industry's leading standards-setting organizations) and GSMA 5G Cybersecurity Knowledge Base to provide useful guidance on 5G security risks and mitigation measures. Huawei has been proactively involved in the telecom cyber security standardization activities led by GSMA ITU-T, 3GPP, and IETF etc., and has joined security organizations such as OIC-CERT, FIRST and partnered with mainstream security companies to ensure the cyber security of its customers and promote the healthy development of industries.

< <https://www.nation.com.pk/26-May-2023/huawei-joins-cybersecurity-thought-leaders-across-the-middle-east-and-central-asia> https://www.nation.com.pk/26-May-2023/huawei-joins-cybersecurity-thought-leaders-across-the-middle-east-and-central-asia>

< <https://www.msn.com/en-xl/news/other/huawei-joins-cybersecurity-thought-leaders-across-the-middle-east-and-central-asia/ar-AA1bLv14> https://www.msn.com/en-xl/news/other/huawei-joins-cybersecurity-thought-leaders-across-the-middle-east-and-central-asia/ar-AA1bLv14>

 

G7 leaders warn of AI dangers, say the time to act is now

... “Regulators should set timeframes by which AI model vendors must use standards to authenticate provenance of content, software, and other digital assets used in their systems. See standards from C2PA, Scitt.io, IETF for examples,” Litan said.

< <https://www.computerworld.com/article/3697154/g7-leaders-warn-of-ai-dangers-say-the-time-to-act-is-now.html> https://www.computerworld.com/article/3697154/g7-leaders-warn-of-ai-dangers-say-the-time-to-act-is-now.html>

 

Spying Abuses Are Still a Concern, 10 Years After Edward Snowden

... "Despite the public outcry, investigations by Congress, pronouncements by President Obama, and federal court rulings. I don't think much has changed," security expert Bruce Schneier wrote in a Snowden retrospective for the IETF. "The NSA canceled a program here and a program there, and it is now more public about defense. But I don't think it is any less aggressive about either bulk or targeted surveillance. Certainly its government authorities haven't been restricted in any way. And surveillance capitalism is still the business model of the Internet."

< <https://reason.com/2023/05/24/spying-abuses-are-still-a-concern-10-years-after-edward-snowden/> https://reason.com/2023/05/24/spying-abuses-are-still-a-concern-10-years-after-edward-snowden/>

 

What is DKIM Email Security Technology? DKIM Explained

... DKIM Fundamentals: The IETF publishes full information on the DKIM and its standards, which were last updated in 2011. DKIM deploys as text files in an organization’s hosted DNS record, but the standard can be complex to deploy correctly and maintain. Fortunately, the complexity can be easily managed by understanding the different components and how they work.

< <https://www.esecurityplanet.com/networks/what-is-dkim/> https://www.esecurityplanet.com/networks/what-is-dkim/>

 

What Is Sender Policy Framework? SPF Email Explained

... Basic SPF File Structure: The IETF publishes the full information on the SPF and its standards which were last updated in 2014. At its core, the SPF file consists of a simple .txt file uploaded to the DNS record on an organization’s domain hosting provider. It is also important to note that SPF records cannot exceed 10 tags or 255 characters, which can cause significant limitations for larger organizations.

< <https://www.esecurityplanet.com/networks/sender-policy-framework/> https://www.esecurityplanet.com/networks/sender-policy-framework/>

 

RKVST Releases Blockchain-Backed Solution to Verify the Authenticity of Data

... Building on the principles of transparency and integrity coming from the distributed ledger space there are now several open standards efforts aiming to address the issue of trustworthy data including the Coalition for Content Provenance and Authenticity (C2PA); Content Authenticity Initiative (CAI); and the IETF Supply Chain Integrity, Transparency and Trust (SCITT) Working Group.

< <https://www.dbta.com/Editorial/News-Flashes/RKVST-Releases-Blockchain-Backed-Solution-to-Verify-the-Authenticity-of-Data-158850.aspx> https://www.dbta.com/Editorial/News-Flashes/RKVST-Releases-Blockchain-Backed-Solution-to-Verify-the-Authenticity-of-Data-158850.aspx>

 

AirTags, Tiles, SmartTags And The Dilemmas Of Personal Tracking Devices

... A draft proposal by Apple and Google, submitted to the IETF, seeks to address these points but it remains complicated.

< <https://hackaday.com/2023/05/22/airtags-tiles-smarttags-and-the-dilemmas-of-personal-tracking-devices/> https://hackaday.com/2023/05/22/airtags-tiles-smarttags-and-the-dilemmas-of-personal-tracking-devices/>

 

Technische Standards gefordert: G7-Staaten warnen vor KI-Gefahren [Technical standards called for: G7 states warn of AI dangers]

... Beispiele für solche Standards sind für Litan C2PA, Scitt.io und IETF. Weiter mahnt sie, "wir müssen handeln, und zwar bald". Erste Ansätze dazu legte die EU mit der Einigung auf den AI Act vor. Er soll generative Tools wie ChatGPT, DALL-E und Midjourney in Bezug auf Design und Einsatz eindämmen und mit dem EU-Recht und den Grundrechten in Einklang bringen.

< <https://www.computerwoche.de/a/g7-staaten-warnen-vor-ki-gefahren,3614511> https://www.computerwoche.de/a/g7-staaten-warnen-vor-ki-gefahren,3614511>

 

Späte Einsicht: Wie Apple und Google Stalking per Tracker verhindern wollen [ Late insight: How Apple and Google want to prevent stalking via tracker]

... Nun soll ein gemeinsam mit Google entwickelter Branchenstandard besser als bisher vor Bluetooth-Trackern warnen, und zwar auf Android- und iOS-Smartphones. Dafür haben Mitarbeiter von Apple und Google einen Entwurf unter dem Dach der IETF veröffentlicht.

< <https://www.heise.de/news/Wie-Apple-und-Google-gegen-Stalking-per-Bluetooth-Tracker-schuetzen-wollen-9048726.html> https://www.heise.de/news/Wie-Apple-und-Google-gegen-Stalking-per-Bluetooth-Tracker-schuetzen-wollen-9048726.html>

 

En toen was er internet [And then there was the internet]

... Intussen werd er ook gewerkt aan een ander, veel breder toepasbaar protocol: het internetprotocol. Dit maakte communicatie tussen alle verschillende computermerken en besturingssystemen mogelijk, dus niet alleen tussen Unix-gebruikers. Daarin speelde Erik Huizer een grote rol, onder meer als lid van de IETF, een groep van deskundigen die technische afspraken over het internet maakt, bijvoorbeeld over protocollen voor internet en e-mail.

< <https://www.nemokennislink.nl/publicaties/en-toen-was-er-internet/> https://www.nemokennislink.nl/publicaties/en-toen-was-er-internet/>

 

Bluetoothトラッカーの悪用に対処するためAppleとGoogleが協力 [Apple and Google work together to address Bluetooth tracker abuse]

... AppleのiOSには既に、AirTagによる望ましくない追跡に対応する強力な機能が備わっていますが、これらの機能は、最近自社トラッカー用のペット用首輪アクセサリを発売したTileのようなサードパーティのトラッカーには利用出来ません。今回のパートナーシップの一環として、AppleとGoogleは業界仕様に関する提案をIETFに提出しました。この仕様には、各メーカーが自社の製品にこれらの機能を組み込む場合に従うべき最適な方法と手順がまとめられています。

< <https://jp.ubergizmo.com/2023/05/22/22422/> https://jp.ubergizmo.com/2023/05/22/22422/>

 

في مؤتمر الجمعية الدولية لشبكات المحمول بأذربيجان : «&e» تشدد على أولوية خلق فضاء إلكتروني آمن [At the Congress of the International Mobile Network Association in Azerbaijan: «&e» stresses the priority of creating a safe cyberspace]

... وتعتبر معايير نظام ضمان أمن معدات الشبكة (NESAS) ومواصفات ضمان الأمن (SCAS) المقترحة من مشروع شراكة الجيل الثالث (3GPP) والجمعية الدولية لشبكات الهاتف المحمول (GSMA)، وقاعدة معارف الأمن السيبراني لشبكات الجيل الخامس، التي اقترحتها الجمعية الدولية لشبكات الهاتف المحمول أمثلة حية على الجهود التعاونية العالمية في معالجة الأمن السيبراني، ونماذج مجدية لتقييم امتثال المصنعين بمتطلبات الأمان، وشاركت هوواي في أنشطة لتوحيد معايير الأمن السيبراني للاتصالات تحت قيادة الجمعية الدولية لشبكات الهاتف المحمول، وقطاع تقييس الاتصالات بالاتحاد الدولي للاتصالات GSMA ITU-T، ومشروع شراكة الجيل الثالث، وفريق عمل هندسة الإنترنت (IETF)، وغيرها. كما تعاونت الشركة مع منظمات تعنى بأمن الإنترنت، مثل فريق الاستجابة للطوارئ الحاسوبية في منظمة التعاون الإسلامي (OIC-CERT)، ومنظمة FIRST، ودخلت في شراكة مع عدد من أبرز شركات الأمن، لضمان الأمن السيبراني لـعملائها، وتعزيز عمل القطاعات على أكمل وجه.

< <https://www.albayan.ae/economy/uae/2023-05-22-1.4667155> https://www.albayan.ae/economy/uae/2023-05-22-1.4667155>

 

**********************

SECURITY & PRIVACY

**********************

Exploring the Feasibility of EU Cybersecurity Certification in support of New Technologies

Once more, the European Union Agency for Cybersecurity (ENISA), organises the Cybersecurity Certification Conference, during the twice annually cybersecurity certification week that brings together experts, private stakeholders and public authorities representatives.

< <https://www.enisa.europa.eu/news/exploring-the-feasibility-of-eu-cybersecurity-certification-in-support-of-new-technologies> https://www.enisa.europa.eu/news/exploring-the-feasibility-of-eu-cybersecurity-certification-in-support-of-new-technologies>

 

NSA and Partners Identify China State-Sponsored Cyber Actor Using Built-in Network Tools When Targeting U.S. Critical Infrastructure Sectors

The National Security Agency (NSA) and partners have identified indicators of compromise (IOCs) associated with a People’s Republic of China (PRC) state-sponsored cyber actor using living off the land techniques to target networks across U.S. critical infrastructure.

< <https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3406058/nsa-and-partners-identify-china-state-sponsored-cyber-actor-using-built-in-netw/> https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3406058/nsa-and-partners-identify-china-state-sponsored-cyber-actor-using-built-in-netw/>

 

5G network slices could be vulnerable to attack, researchers say

5G promises increased speed, lower latency, and support for a significantly larger number of connected devices. But the growth in devices and in new applications that will ensue also will expand the attack surface, offering new opportunities for malicious actors to take advantage of security gaps.

< <https://www.networkworld.com/article/3697269/5g-network-slices-could-be-vulnerable-to-attack-researchers-say.html> https://www.networkworld.com/article/3697269/5g-network-slices-could-be-vulnerable-to-attack-researchers-say.html>

 

Routing, Trust & RPKI.

Issuers have given important documents, like paper money, more security measures over time. There’s a constant battle against forgers like Francis Greenway. Issuers face the risk that people will reject legitimate documents when they cannot distinguish them from fakes. Users face the risk that they accept a forgery or reject a real document, losing value in both situations.

< <https://ipv4.global/blog/routing-trust-rpki/> https://ipv4.global/blog/routing-trust-rpki/>

 

On the (In)Security of ElGamal in OpenPGP by Luca De Feo, Bertram Poettering, Alessandro Sorniotti

Roughly four decades ago, Taher ElGamal put forward what is today one of the most widely known and best understood public key encryption schemes. ElGamal encryption has been used in many different contexts, chiefly among them by the OpenPGP email encryption standard. Despite its simplicity, or perhaps because of it, in reality there is a large degree of ambiguity on several key aspects of the cipher. Each library in the OpenPGP ecosystem seems to have implemented a slightly different "flavor" of ElGamal encryption. While-taken in isolation-each implementation may be secure, we reveal that in the interoperable world of OpenPGP, unforeseen cross-configuration attacks become possible. Concretely, we propose different such attacks and show their practical efficacy by recovering plaintexts and even secret keys.

< <https://cacm.acm.org/magazines/2023/6/273228-on-the-insecurity-of-elgamal-in-openpgp/fulltext> https://cacm.acm.org/magazines/2023/6/273228-on-the-insecurity-of-elgamal-in-openpgp/fulltext>

 

Microsoft says China-backed hackers targeting critical infrastructure in US and Guam

A state-sponsored Chinese hacking group has been spying on a wide range of US critical infrastructure organisations, from telecommunications to transportation hubs, western intelligence agencies and Microsoft have said.

< <https://www.theguardian.com/us-news/2023/may/24/microsoft-china-hacker-critical-infrastructure-us-guam> https://www.theguardian.com/us-news/2023/may/24/microsoft-china-hacker-critical-infrastructure-us-guam>

 

Microsoft: State-sponsored Chinese hackers could be laying groundwork for disruption

State-backed Chinese hackers have been targeting U.S. critical infrastructure and could be laying the technical groundwork for the potential disruption of critical communications between the U.S.

< <https://apnews.com/article/microsoft-china-hacking-us-infrastructure-d4a4faefcc5d4d3c9f72e9acc24a71f9> https://apnews.com/article/microsoft-china-hacking-us-infrastructure-d4a4faefcc5d4d3c9f72e9acc24a71f9>

 

Defending Root Dns Servers Against Ddos Using Layered Defenses (Extended)

Abstract: DDoS attacks exhaust resources, leaving a server unavailable to legitimate clients. The DNS is a frequent target of DDoS attacks. Since DNS is a critical infrastructure service, protecting it from DoS is imperative. Many prior approaches have focused on specific filters or anti-spoofing techniques to protect generic services. DNS root nameservers are more challenging to protect, since they use fixed IP addresses, serve very diverse clients and requests, receive predominantly UDP traffic that can be spoofed, and must guarantee high quality of service. In this paper we propose a layered DDoS defense for DNS root nameservers.

< <https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4457103> https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4457103>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

Two Researchers of Samsung Were Elected as Working Group Chairs of 3GPP, the World’s Largest Mobile Communications Standard Development Organization [news release]

Samsung Electronics has announced that two researchers were elected chairs of two Working Groups in the Third Generation Partnership Project (3GPP), the world’s largest telecommunications standard development organization.

< <https://news.samsung.com/global/two-researchers-of-samsung-were-elected-as-working-group-chairs-of-3gpp-the-worlds-largest-mobile-communications-standard-development-organization> https://news.samsung.com/global/two-researchers-of-samsung-were-elected-as-working-group-chairs-of-3gpp-the-worlds-largest-mobile-communications-standard-development-organization>

 

Scaling up with cloud-native 5G: valuable insights and takeaways

... This blog explores valuable insights and key learnings from running cloud-native core networks at scale, including how to resolve 3GPP standard ambiguities, improve 5G service offerings and achieve multi-vendor field integration.

< <https://www.ericsson.com/en/blog/2023/5/scaling-up-with-cloud-native-5g-valuable-insights-and-takeaways> https://www.ericsson.com/en/blog/2023/5/scaling-up-with-cloud-native-5g-valuable-insights-and-takeaways>

 

UDPベースで高速化した汎用プロトコル、最新HTTPに採用された「QUIC」とは [What is "QUIC" adopted in the latest HTTP, a general-purpose protocol that is UDP based on speedup?]

... QUICとはUDPをベースとした汎用通信プロトコルである。IETFが2021年に「RFC 9000」として勧告し、新たなインターネット標準技術となった。2022年に「RFC 9114」にて勧告されたHTTP/3は、トランスポート層プロトコルとしてQUICを採用した。 

< <https://active.nikkeibp.co.jp/atcl/act/19/00146/041000113/?i_cid=nbpnxta_sied_newarticles> https://active.nikkeibp.co.jp/atcl/act/19/00146/041000113/?i_cid=nbpnxta_sied_newarticles>

 

Новая сетевая архитектура: TCP/IP уйдет в прошлое? [New network architecture: will TCP/IP go back in time?]

... Откуда ветер дует? Идея улучшить технологическую базу, на которой создан и функционирует Интернет, не нова – соответствующие попытки периодически предпринимаются по всему миру. Как минимум несколько лет существуют такие протоколы, как QUIC, представленный американской Google в 2012-2013 гг., и New IP, продвигаемый китайской Huawei с 2019-2020 гг.

< <https://www.it-world.ru/tech/technology/193320.html> https://www.it-world.ru/tech/technology/193320.html>

 

**********************

OTHERWISE NOTEWORTHY

**********************

Flexibility, agility, and host of new network features delivered by latest Broadband Forum specification

More stable networks, greater interoperability, and cost savings for operators will become possible thanks to the latest technical report published today by Broadband Forum. The second issue of Technical Report-459 will enable improved resiliency, scalability, and faster deployment times, which will give end-users a more reliable and more consistent service.

< <https://www.broadband-forum.org/2023-05-25-flexibility-agility-and-host-of-new-network-features-delivered-by-latest-broadband-forum-specification> https://www.broadband-forum.org/2023-05-25-flexibility-agility-and-host-of-new-network-features-delivered-by-latest-broadband-forum-specification>

 

EPUB 3.3 becomes a W3C Recommendation

Composite showing the epub logo and a diagram of the various containers that constitute an epub fileThe EPUB 3 Working Group has published EPUB 3.3, EPUB Reading Systems 3.3 and EPUB Accessibility 1.1 as W3C Recommendations, as part of the Digital Publishing activity.

< <https://www.w3.org/blog/news/archives/9919> https://www.w3.org/blog/news/archives/9919>

 

First Public Working Draft: Verifiable Credentials JSON Schema Specification 2023

The Verifiable Credentials Working Group has published a First Public Working Draft of Verifiable Credentials JSON Schema Specification 2023. Among other things, the [VC-DATA-MODEL-2] specifies the models used for Verifiable Credentials, Verifiable Presentations, and explains the relationships between three parties: issuers, holders, and verifiers.

< <https://www.w3.org/blog/news/archives/9915> https://www.w3.org/blog/news/archives/9915>

 

The Internet as a Public Utility

I recently attended a workshop on the topic of Lessons Learned from 40 Years of the Internet, and the topic of the Internet as a Public Utility in the context of national regulatory frameworks came up. For me 40 years is just enough time to try and phrase an answer to the big policy question: Has the Internet been a success in the experiment of using market forces to act as an efficient distributor of a public good? Or has it raised more issues than it has addressed?

< <https://www.potaroo.net/ispcol/2023-05/utilities.html> https://www.potaroo.net/ispcol/2023-05/utilities.html>

 

Connectivity Is Everything by Vinton G. Cerf

The Turing Award Laureate for 2022, Bob Metcalfe, coined Metcalfe's Law: The value of the network grows as the square of the number of things connected to it. While some might quibble that the more realistic metric might be n log n, the point is well made. As the inventor of the Ethernet, now ubiquitous in so many forms including its wireless origins (ALOHANET) and present form as Wi-Fi as well as wired and optical versions, Metcalfe has earned the right to speak about connectivity. His premise applies equally well to the Internet: connectivity is its essential property. When Robert Kahn and I started working on the Internet in 1973, a primary assumption and driving design premise was that anything on the Internet should be able to connect to anything else, regardless of which network the source and destination happened to be on.

< <https://cacm.acm.org/magazines/2023/6/273223-connectivity-is-everything/fulltext> https://cacm.acm.org/magazines/2023/6/273223-connectivity-is-everything/fulltext>

 

China poised to dominate global online space, undermine Taiwan's internet security

The Chinese Communist Party (CCP) is trying to control the internet and challenge Taiwan's internet security, said Peter Raymond, a senior associate at the Center for Strategic and International Studies (CSIS), on Tuesday (May 23).

< <https://www.taiwannews.com.tw/en/news/4901793> https://www.taiwannews.com.tw/en/news/4901793>

 

Noel Gallagher: ‘I think things were better pre-internet, I think that’s a fact’

The High Flying Birds leader and former Oasis guitarist has very strong views on AI music. And the internet. And social media. And pretty much everything else

< <https://www.irishtimes.com/culture/music/2023/05/27/noel-gallagher-theres-an-ai-version-of-freddie-mercury-singing-dont-look-back-in-anger-yknow-get-a-girlfriend/> https://www.irishtimes.com/culture/music/2023/05/27/noel-gallagher-theres-an-ai-version-of-freddie-mercury-singing-dont-look-back-in-anger-yknow-get-a-girlfriend/>

 

Microsoft Calls for A.I. Rules to Minimize the Technology’s Risks

Microsoft endorsed a crop of regulations for artificial intelligence on Thursday, as the company navigates concerns from governments around the world about the risks of the rapidly evolving technology.

< <https://www.nytimes.com/2023/05/25/technology/microsoft-ai-rules-regulation.html> https://www.nytimes.com/2023/05/25/technology/microsoft-ai-rules-regulation.html>

 

Microsoft chief says deep fakes are biggest AI concern

Microsoft President Brad Smith said Thursday that his biggest concern around artificial intelligence was deep fakes, realistic looking but false content.

< <https://www.reuters.com/technology/microsoft-chief-calls-humans-rule-ai-safeguard-critical-infrastructure-2023-05-25/> https://www.reuters.com/technology/microsoft-chief-calls-humans-rule-ai-safeguard-critical-infrastructure-2023-05-25/>

 

Microsoft won over Washington. A new AI debate tests its president.

In 2017, Microsoft president Brad Smith made a bold prediction. Speaking on a panel at the Davos World Economic Forum, he said governments would be talking about how to regulate artificial intelligence in about five years.

< <https://www.washingtonpost.com/technology/2023/05/25/brad-smith-microsoft-ai/> https://www.washingtonpost.com/technology/2023/05/25/brad-smith-microsoft-ai/>

 

How do we best govern AI? by Brad Smith - Vice Chair & President

“Don’t ask what computers can do, ask what they should do.” That is the title of the chapter on AI and ethics in a book I co-authored in 2019. At the time, we wrote that, “This may be one of the defining questions of our generation.” Four years later, the question has seized center stage not just in the world’s capitals, but around many dinner tables.

< <https://blogs.microsoft.com/on-the-issues/2023/05/25/how-do-we-best-govern-ai/> https://blogs.microsoft.com/on-the-issues/2023/05/25/how-do-we-best-govern-ai/>

 

AI will be everywhere, but its rise will be mundane not apocalyptic

Cheered by the news that OpenAI, the company behind ChatGPT, had released a free iPhone app for the language model, I went to the Apple app store to download it, only to find that it was nowhere to be found. This is because – as I belatedly discovered – it’s currently only available via the US app store and will be rolled out to other jurisdictions in due course. Despite that, though, the UK store was positively groaning with “ChatGPT” apps – of which I counted 25 before losing the will to live.

< <https://www.theguardian.com/commentisfree/2023/may/27/ai-will-be-everywhere-but-its-rise-will-be-mundane-not-apocalyptic-chatgpt> https://www.theguardian.com/commentisfree/2023/may/27/ai-will-be-everywhere-but-its-rise-will-be-mundane-not-apocalyptic-chatgpt>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home