industryterm:internet protocol

  • Unveiling #blockchain’s full Potential
    https://hackernoon.com/unveiling-blockchains-full-potential-784519610708?source=rss----3a8144ea

    Unveiling Blockchain’s full Potential — A new Era of Internet Protocols and ApplicationsWhat you can expect from the read:Introduction to cryptoeconomic mechanism design, a new art of designing protocols next to cryptography or machine learning, including what it is and what is the rationality, and how you can leverage it in your own applications and protocolsA discussion why Blockchain is the missing technological piece to harness cryptoeconomic mechanisms in Internet applications and servicesTwo example HTTP protocols showcasing the power and practicabilitySummary of future emerging killer applications resulting from the application of cryptoeconomicscourtesy of Kristina FlourCryptoeconomic mechanism designing is the true ingenuity of Blockchain. In this article we explore the (...)

    #cryptoeconomics #future-internet #mechanism-design #technology

  • Net of Rights - YouTube
    https://www.youtube.com/watch?v=m1U0Ebix-aQ

    Net of Rights is a short documentary film which explores the relation between Internet protocols and the promotion and protection of Human Rights. Internet Engineers have defined the Internet as a network of networks, providing connectivity for all users, at all times, for any content. Internet connectivity increases the capacity for individuals to exercise their rights, the core of the Internet, its architectural design is therefore closely intertwined with the human rights framework. However, the assertion that technology and the design of standards and protocols is a ethically neutral task are still commonplace. The series of interviews recorded during the 92nd meeting of the Internet Engineering Task Force (IETF), held in Dallas, Texas, in March 2015, demonstrated that this belief in the neutrality of standards and protocols is starting to change. It is becoming more apparent that promoting an open, secure, unfiltered and reliable Internet is essential for the rights to privacy, expression and assembly. But how can these concepts be addressed on the protocol level? Without taking human rights into account while developing protocols, the human rights-enabling characteristics of the Internet are at risk. While the Internet was designed with freedom and openness of communication as core values, as the growth in scale and commercialization of the Internet have caused a shift in those values. The influence of such world-views started to compete with other values. The rights-enabling characteristics of the Internet will be endangered if they are not properly defined, described and protected. The reverse is also true: if we don’t protect human rights online, we risk loss of functionality and connectivity of the Internet itself.

    #Internet #Droits_humains #Protocoles

  • A Net of Rights? New film links Human Rights and Internet Protocols · Article 19
    https://www.article19.org/resources.php/resource/38278/en/a-net-of-rights?-new-film-links-human-rights-and-internet-protocols

    It is too-often assumed that there is no link between protocols (the standards which underpin the way the internet functions) and human rights, but this is simply not the case, as the film argues. The Internet aspires to be the global ‘network of networks’, providing connectivity for all users, at all times, for any content. Connectivity increases the capacity for individuals to exercise their rights, meaning that the architectural design of the internet is, necessarily, intertwined with the human rights framework.
    Promoting open, secure and reliable connectivity is essential for the rights to privacy, expression and assembly. But how are these concepts addressed at the protocol level? Without proper definition, the human rights-enabling characteristics of the internet are at risk.

    https://www.article19.org/img.php?f=/data/images/net_of_rights_title.jpg&p=toWidth&o=jpg&a[width]=512

  • Internet Monitoring
    https://www.privacyinternational.org/node/12

    Internet monitoring is the act of capturing data as it travels across the internet towards its intended destination. The units being monitored or captured are often referred to as ‘packets’. Packets are the broken up parts of the data sent (messages, emails, images, web pages, files) over Internet Protocol which computers break into small chunks, rout through a network of computers and then reassemble at their destination to become the message, web page, image or file presented to you on your (...)

    #surveillance #Privacy_International

  • “Today, 4 March, ARTICLE 19 and Coding Rights are launching Net of Rights, a short film which explores the link between internet protocols and human rights online. The film will screen at 6pm at the Internet Freedom Festival, or can be seen on the Net of Rights website.”

    https://www.article19.org/resources.php/resource/38278/en/a-net-of-rights?-new-film-links-human-rights-and-internet-protocols

    https://hrpc.io/net-of-rights

    https://vimeo.com/157722482

    #Internet_freedom #human_rights #Internet_protocols #HRPC

  • NTP - Network Time Protocol - can be abused for attacks on HTTPS, DNSSEC, and Bitcoin.

    Researchers at University of Boston describe how unencrypted NTP traffic can be intercepted and then used to change the time of clients. For example, the clock can be turned back to a point where the host would accept a fraudulent digital certificate that has been revoked.

    Or by advancing the time on a DNS resolver the DNSSEC validation can be made to fail.

    The researches also give advice on how to protect yourself against these various attacks.

    Attacking the Network Time Protocol

    http://www.cs.bu.edu/~goldbe/NTPattack.html

    Abstract—We explore the risk that network attackers can
    exploit unauthenticated Network Time Protocol (NTP) traffic to
    alter the time on client systems. We first discuss how an onpath
    attacker
    , that hijacks traffic to an NTP server, can quickly
    shift time on the server’s clients. Then, we present a extremely
    low-rate (single packet) denial-of-service attack that an off-path
    attacker
    , located anywhere on the network, can use to disable NTP
    clock synchronization on a client. Next, we show how an off-path
    attacker can exploit IPv4 packet fragmentation to dramatically
    shift time on a client. We discuss the implications on these
    attacks on other core Internet protocols, quantify their attack
    surface using Internet measurements, and suggest a few simple
    countermeasures
    that can improve the security of NTP.

    http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf
    backup: http://docdro.id/Cf0QqBD

    #back_to_the_future
    #NTP #HTTPS #DNSSEC
    #DoS
    #Timeshift

  • Bluetooth 4.2 increases privacy, adds speed and IPv6

    http://www.nfcworld.com/2014/12/08/333126/bluetooth-4-2-increase-speed-security-smart-devices

    Bluetooth beacons are now unable to engage with smartphones without permission from the user and making it harder for eavesdroppers to track a device via its Bluetooth connection.

    [...]

    the Internet Protocol Support Profile (IPSP) will allow Bluetooth Smart sensors to access the Internet directly via IPv6/6LoWPAN,”

    The Verge :
    http://www.theverge.com/2014/12/3/7330117/bluetooth-4-2-is-faster-safer-and-lets-lightbulbs-connect-to-the

    Bluetooth 4.2 has clear advances over its predecessors, but Ars Technica reports that “some, but not all” of the new specification’s features will be available to those with older devices. Many Bluetooth adapters included in modern devices are configured to work with Bluetooth 4.0, and although a software update previously meant devices using such adapters could also use version 4.1, a Bluetooth SIG spokesperson said that to take advantage of the increased speed and packet size of version 4.2, a hardware update would be required.

    #Bluetooth
    #6LoWPAN
    #IPv6
    #IoT

  • ‘U.S. monopoly over Internet must go’ - The Hindu
    http://www.thehindu.com

    Most of Pouzin’s career has been devoted to the design and implementation of computer systems, most notably the CYCLADES computer network.

    Interview with Louis Pouzin, a pioneer of the Internet and recipient of the Chevalier of Légion d’Honneur, the highest civilian decoration of the French government

    Louis Pouzin is recognised for his contributions to the protocols that make up the fundamental architecture of the Internet. Most of his career has been devoted to the design and implementation of computer systems, most notably the CYCLADES computer network and its datagram-based packet-switching network, a model later adopted by the Internet as Transmission Control Protocol (TCP)/Internet Protocol (IP). Apart from the Chevalier of Légion d’Honneur, Mr. Pouzin, 83, was the lone Frenchman among American awardees of the Queen Elizabeth Prize for Engineering, given to the inventors of Internet technology in its inaugural year, 2013.

    Ahead of the ninth annual meeting of the Internet Governance Forum (IGF) from September 2-5 in Istanbul, Mr. Pouzin shared his concerns regarding the monopoly enjoyed by the U.S. government and American corporations over the Internet and the need for democratising what is essentially a global commons. Excerpts from an interview, over Skype, with Vidya Venkat.

    What are the key concerns you would be discussing at the IGF ?

    As of today, the Internet is controlled predominantly by the U.S. Their technological and military concerns heavily influence Internet governance policy. Unfortunately, the Brazil Netmundial convened in April, 2014, with the Internet Corporation for Assigned Names and Numbers (ICANN), following objections raised by [Brazilian] President Dilma Rousseff to the National Security Agency (NSA) spying on her government, only handed us a non-binding agreement on surveillance and privacy-related concerns. So the demand for an Internet bill of rights is growing loud. This will have to lay out what Internet can and cannot do. Key government actors must sign the agreement making it binding on them. The main issue pertaining to technological dominance and thereby control of the network itself has to be challenged and a bill of rights must aim to address these concerns.

    What is the way forward if the U.S. dominance has to be challenged?

    Today, China and Russia are capable of challenging U.S. dominance. Despite being a strong commercial power, China has not deployed Internet technology across the world. The Chinese have good infrastructure but they use U.S. Domain Naming System, which is a basic component of the functioning of the Internet. One good thing is because they use the Chinese language for domain registration, it limits access to outsiders in some way.

    India too is a big country. It helps that it is not an authoritarian country and has many languages. It should make the most of its regional languages, but with regard to technology itself, India has to tread more carefully in developing independent capabilities in this area.

    As far as European countries are concerned, they are mostly allies of the U.S. and may not have a strong inclination to develop independent capabilities in this area. Africa again has potential; it can establish its own independent Internet network which will be patronised by its burgeoning middle classes.

    So you are saying that countries should have their own independent Internet networks rather than be part of one mega global network ?

    Developing independent networks will take time, but to address the issue of dominance in the immediate future we must first address the monopoly enjoyed by ICANN, which functions more or less as a proxy of the U.S. government. The ICANN Domain Naming System (DNS) is operated by VeriSign, a U.S. government contractor. Thus, traffic is monitored by the NSA, and the Federal Bureau of Investigation (FBI) can seize user sites or domains anywhere in the world if they are hosted by U.S. companies or subsidiaries.
    ICANN needs to have an independent oversight body. The process for creating a new body could be primed by a coalition of states and other organisations placing one or several calls for proposals. Evaluation, shortlist, and hopefully selection, would follow. If a selection for the independent body could be worked out by September 2015, it would be well in time for the contract termination of the Internet Assigned Numbers Authority (IANA) with the U.S. government.

    The most crucial question is should governments allow citizens to end up as guinea pigs for global internet corporations ?

    Breaking that monopoly does not require any agreement with the U.S. government, because it is certainly contrary to the World Trade Organization’s principles. In other words, multiple roots [DNS Top Level Domains (TLD)] are not only technically feasible; they have been introduced in the Internet back in 1995, even before ICANN was created. This avenue is open to entrepreneurs and institutions for innovative services tailored to user needs, specially those users unable to afford the extravagant fees raked in by ICANN. The deployment of independent roots creates competition and contributes to reining in devious practices in the domain name market.
    The U.S. government is adamant on controlling the ICANN DNS. Thus, copies (mirrors) should be made available in other countries out of reach from the FBI. A German organisation Open Root Server Network is, at present, operating such a service. To make use of it, users have to modify the DNS addresses in their Internet access device. That is all, usage is free.

    But would this process not result in the fragmentation of the Internet ?

    Fragmentation of the Internet is not such a bad thing as it is often made out to be. The bone of contention here is the DNS monopoly. On August 28, nearly 12 millions Internet users subscribing to Time Warner’s cable broadband lost connectivity due to a sudden outage in one day. In a world of fragmented Internet networks, such mass outages become potentially impossible. The need of the hour is to work out of the current trap to use a more interoperable system.
    In this context, a usual scarecrow brandished by the U.S. government is fragmentation, or Balkanisation, of the Internet. All monopolies resort to similar arguments whenever their turf is threatened by a looming competition. Furthermore, the proprietary naming and unstable service definitions specific to the likes of Amazon, Apple, Facebook, Google, Twitter, and more, have already divided the Internet in as many closed and incompatible internets of captive users.

    Recently, the Indian External Affairs Minister had objected to U.S. spying on the Bharatiya Janata Party. Can governments like India use a forum like IGF to raise concerns relating to surveillance ?

    Even if governments do attend IGF, they do not come with a mandate. A major problem with the Internet governance space today is that they are under the dominance of corporate lobbies. So it is a bit hard to say what could be achieved by government participation in the IGF. This is a problem of the IGF : it has no budget or secretary general, it is designed to have no influence and to maintain the status quo. That is why you have a parallel Internet Ungovernance Forum which is not allying with the existing structure and putting forth all the issues they want to change. Indian citizens could participate in this forum to raise privacy and surveillance-related concerns.

    Do you feel Internet governance is still a very alien subject for most governments and people to engage with ?

    Unfortunately, the phrase “Internet governance” is too abstract for most people and governments to be interested in. The most crucial question is what kind of society do you want to live in? Should governments allow citizens to end up as guinea pigs for global Internet corporations? The revelations by NSA contractor Edward Snowden have proved beyond doubt that user data held by Internet companies today are subject to pervasive surveillance. Conducting these intrusive activities by controlling the core infrastructure of the Internet without obtaining the consent of citizen users is a big concern and should be debated in public. Therefore, debates about Internet governance are no longer alien; they involve all of us who are part of the network.❞

    • http://www.openbts.org

      OpenBTS.org is an open source software project dedicated to revolutionizing mobile networks by substituting legacy telco protocols and traditionally complex, proprietary hardware systems with Internet Protocol and a flexible software architecture. This architecture is open to innovation by anybody, allowing the development of new applications and services and dramatically simplifying the setting up and operation of a mobile network.

  • “American victims of terror sponsored by Iran have moved to seize the internet licenses, contractual rights and domain names being provided by the United States to the extremist regime in Tehran.”

    "The families, who hold unsatisfied American federal court judgments amounting to more than a billion dollars against the Iranian government seek to own all the “top-level domain” (TLD) names provided by the US to Iran including the .ir TLD, the ایران TLD and all Internet Protocol (IP) addresses being utilized by the Iranian government and its agencies."

    “The court papers have been served on the Internet Corporation for Assigned Names and Numbers (ICANN), an agency of the US Department of Commerce [sic] in Washington, DC, which administrator [sic again] the World Wide Web [more sic].”

    http://www.free-press-release.com/news-american-victims-of-terrorism-look-to-seize-iran-s-internet

    #ICANN #DNS #ccTLD #domain_name #Iran

  • Jacob Appelbaum: The American Wikileaks Hacker | Culture News | Rolling Stone
    http://www.rollingstone.com/culture/news/meet-the-american-hacker-behind-wikileaks-20101201?page=2

    He beckons me over to one of his eight computers and presses several keys, activating Blockfinder. In less than 30 seconds, the program lists all of the Internet Protocol address allocations in the world — potentially giving him access to every computer connected to the Internet. Appelbaum decides to home in on Burma, a small country with one of the world’s most repressive regimes. He types in Burma’s two-letter country code: “mm,” for Myanmar. Blockfinder instantly starts to spit out every IP address in Burma.
    Blockfinder informs Appelbaum that there are 12,284 IP addresses allocated to Burma, all of them distributed by government-run Internet-service providers. In Burma, as in many countries outside the United States, Internet access runs through the state. Appelbaum taps some keys and attempts to connect to every computer system in Burma. Only 118 of them respond. “That means almost every network in Burma is blocked from the outside world,” he says. “All but 118 of them.”

    These 118 unfiltered computer systems could only belong to organizations and people to whom the government grants unfettered Internet access: trusted politicians, the upper echelons of state-run corporations, intelligence agencies.

    “Now this,” Appelbaum says, “is the good part.”

    He selects one of the 118 networks at random and tries to enter it. A window pops up asking for a password. Appelbaum throws back his head and screams with laughter — a gleeful, almost manic trill. The network runs on a router made by Cisco Systems and is riddled with vulnerabilities. Hacking into it will be trivial.

    It’s impossible to know what’s on the other side of the password. The prime minister’s personal e-mail account? The network server of the secret police? The military junta’s central command? Whatever it is, it could soon be at Appelbaum’s fingertips.

    So will he do it?

    “I could,” Appelbaum says, with a smile. “But that would be illegal, wouldn’t it?”

  • Brick Nintendo before they brick you! | DefectiveByDesign.org
    http://www.defectivebydesign.org/nintendo

    The Nintendo 3DS keeps track of every game you play, along with any data or information created while using the device. This includes personal data such as any name, address, or other information you enter; as well as “age, gender, geographic area, game play data, online status, Nintendo 3DS System serial number and device ID, device certificate information, cookies, Friend Codes, wireless access point information, Internet Protocol (’IP’) address, and Media Access Control (’MAC’) address” (to quote the Nintendo 3DS System Privacy Policy). Further, they collect all “User Content,” which they define as all “[...] comments, messages, images, photos, movies, information, data and other content”.
    (...)
    The Nintendo 3DS will send the Activity Log to Nintendo when the wifi is connected.
    (...)
    Nintendo can then choose to share your information and use it to target advertisements to you.
    (...)
    Worst of all, Nintendo has claimed the right to use the information they collect from your device to judge if you are allowed to continue using it.

    #nintendo #privacy #fsf