Back to home
Technology

DNS Provider Quad9 Sees Piracy Blocking Orders as "Existential Threat"

Source

Hacker News

Published

TL;DR

AI Generated

DNS provider Quad9 is facing an "existential threat" due to piracy blocking orders in France, which also targeted tech giants like Google and Cloudflare. While larger companies can handle the legal challenges, Quad9, as a small non-profit, lacks the resources to do so. The company argues that copyright holders are unfairly targeting neutral intermediaries like DNS providers, impacting internet infrastructure. The French blocking orders have already led Cisco to exit France, and Quad9 had to apply the block worldwide. Quad9 raises important questions about the responsibility of technical infrastructure and the potential consequences of these legal battles on internet openness and privacy.

Read Full Article

Similar Articles

Stealth Signals Are Bypassing Iran’s Internet Blackout

Stealth Signals Are Bypassing Iran’s Internet Blackout

Hidden files embedded in satellite TV broadcasts are allowing Iranians to bypass the country's internet blackout, ensuring the flow of information. These "stealth signals" are helping citizens access restricted content and communicate with the outside world despite the government's efforts to control internet access. By leveraging satellite technology, individuals in Iran are able to stay connected and informed, highlighting the resilience of communication networks in the face of censorship.

IEEE Spectrum
Iran's forced nationwide internet blackout becomes second-longest on record as it passes 1,000 hours offline — possessing Starlink terminals punishable by death, country using 'military-grade jamming' against service

Iran's forced nationwide internet blackout becomes second-longest on record as it passes 1,000 hours offline — possessing Starlink terminals punishable by death, country using 'military-grade jamming' against service

Iran's nationwide internet blackout has surpassed 1,000 hours, making it one of the longest on record. The blackout, which began on February 28, is being enforced with military-grade jamming and severe penalties for possessing Starlink terminals, including potential execution. Iran has also threatened attacks on infrastructure owned by major tech companies. The blackout is causing significant economic and social disruptions, with human rights organizations condemning it as a violation of fundamental rights. Despite some limited internet traffic, the blackout remains in effect, impacting access to essential information during military actions.

Tom's Hardware
A brief history of Denuvo DRM and the new hypervisor bypass — inside the cat-and-mouse game between Denuvo and the piracy scene

A brief history of Denuvo DRM and the new hypervisor bypass — inside the cat-and-mouse game between Denuvo and the piracy scene

The article discusses the history of Denuvo DRM and the recent hypervisor bypass that has rendered Denuvo's anti-tamper protection ineffective. The hypervisor bypass allows pirates to release DRM-free versions of AAA games on release day, posing a significant threat to Denuvo and its parent company, Irdeto. The bypass involves disabling Windows security features and installing a scene-made hypervisor, potentially exposing systems to security risks. Despite Denuvo's efforts to enhance security without impacting gamers, the cat-and-mouse game between Denuvo and piracy continues, impacting game sales and performance.

Tom's Hardware
Russian state hackers are hijacking TP-Link and MicroTik routers to steal Outlook credentials, cybersecurity center warns — APT28 group targets DNS and redirects traffic to attacker-controlled servers

Russian state hackers are hijacking TP-Link and MicroTik routers to steal Outlook credentials, cybersecurity center warns — APT28 group targets DNS and redirects traffic to attacker-controlled servers

The UK National Cyber Security Centre (NCSC) has issued a warning about Russian state hacking group APT28 targeting TP-Link and MicroTik routers to steal Outlook credentials. APT28 redirects traffic through attacker-controlled DNS servers to harvest passwords and authentication tokens. The group exploits vulnerabilities in routers to rewrite DHCP and DNS settings, directing traffic to malicious servers. The NCSC advises keeping router firmware updated and enabling multi-factor authentication to mitigate risks. APT28, also known as Fancy Bear, has been previously linked to high-profile cyberattacks.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.