- The document provides an overview of the IPv4 address market from the perspective of a broker, including a brief history, the broker's role and experience, ways to obtain IPv4 addresses, the standard deal process, special cases and issues that can arise, current pricing trends, predictions for the future of the market, and suggestions for policymakers.
- It discusses the development of the market since 2010, from early legacy transfers to the creation of a unified global market, and how brokers now facilitate over 350 transfers annually across regions.
- The broker cautions that hijackings may become more sophisticated, ownership disputes could arise, and policies aim to prevent the draining of remaining free address pools, while prices are expected to
Mystery Meat 2.0 – Making hidden mobile interactions accessibleTed Drake
Mystery Meat was the unsavory term for hiding menus behind a parent link. Learn about today’s mobile version and how to make it accessible.
Accessible version: http://www.last-child.com/mystery-meat-2-accessible/
Mystery Meat 2.0 – Making hidden mobile interactions accessibleTed Drake
Mystery Meat was the unsavory term for hiding menus behind a parent link. Learn about today’s mobile version and how to make it accessible.
Accessible version: http://www.last-child.com/mystery-meat-2-accessible/
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Operations
The Monetary Authority of Singapore (MAS) has endorsed the use of public cloud. Financial services institutions (FSIs) can help ensure their AWS implementation addresses key control guidelines by using Accenture Security Framework for AWS.
FabLab Future Trends è una ricerca sui laboratori di progettazione partecipata, partendo dalle prime esperienze degli hackerspace fino ai possibili sviluppi futuri. ABSTRACT: Il processo di progettazione ha risentito di una svolta paradigmatica, da un processo spesso individualistico o di un ristretto gruppo di persone, ci si sta muovendo verso un percorso di progettazione partecipativo continuo. Questo fenomeno necessita di un ripensamento degli spazi analogici quanto di quelli digitali. In questa ricerca si cerca di delineare una breve storia di queste sperimentazioni, dalle diverse peculiarità che le distinguono agli attori che le hanno rese possibili. In ultimo, diverse teorie e realtà innovative, cercheranno di offrire un quadro di riferimento, nella comprensione dei futuri sviluppi nel mondo design partecipato.
Unicam S.A.A.D di Ascoli Piceno
Corso di Design Computazionale
Esame di Design per l'innovazione
Professoressa Lucia Pietroni
Studente Manuel Scortichini
Quest'opera è distribuita con Licenza Creative Commons Attribuzione 4.0 Internazionale.
Traccia audio di Kevin MacLeod "Funin and Sunin".
Immagini scaricate da Freepik.
La volontà di questa ricerca è di spingere un pubblico trasversale ad un approfondimento su questo tema. Attraverso la ricerca FabLab Future Trends offro una panoramica degli argomenti a mio avviso più importanti e dei riferimenti bibliografici autorevoli.
Condividete con me le vostre osservazioni o critiche!
Grazie per l'attenzione :)
El plan de disciplina de Dos para el hermano errado by eliud gamezEliud Gamez Gomez
La disciplina del Señor es la acción que se debe tomar para que el hermano pecador sea humillado y así se salve de su pecado (1 Cor. 5:5; 2 Tes. 3:14), y para que la iglesia no sea contaminada por el pecado en su medio (1Cor. 6: 6 y sig.).
Patent Monetization: Buy, Sell, License, Hold?Erik Oliver
Given the myriad of ways companies use to monetize their patents, how do you know which choice to make? ROL Group delves into this question by looking at the different types of monetization strategies available, and balances the options based on their current market and judicial factors.
With a market capitalization of $2.03 billion, the crypto business has gone to glorious extents. Without a doubt, investors keep on pouring more cash into Bitcoin (BTC) and Ethereum (ETH). Today, there are 457 exchanging platforms across the world.
Directors at Public Interest Registry, Lauren Price & Ulrich Retzlaff give us a general overview of the changing domain name industry and how you can benefit.
The financing of the international trade of goods — and the underwriting thereof — implicate a many-staged process of manufacture, storage, movement, delivery, inspection, and vending. The parties involved are many. The documentation of rights and responsibilities used to fill a small library of paper, and now involves paper, electronic communication, and some digital information transfer. Many points of delay and potential contention persist. Can blockchain clean this up? What other technological developments are reshaping trade finance?
Part of the webinar series: Blockchain Basics 2022
See more at https://www.financialpoise.com/webinars/
How To Make BIG Profits With Short Term RentalsCharles Blair
One of the Most talked about Real Deal Meetup Event presentations is now LIVE In FULL HD quality Video & Sound.
http://bit.ly/ShortTermRentalsVideo
Brittney Calloway "How To Make BIG Profits With Short Term Rentals.
Over 3 1/2 hour of FREE Content, No BS, No Gurus Allowed
http://bit.ly/ShortTermRentalsVideo
The financing of the international trade of goods — and the underwriting thereof — implicate a many-staged process of manufacture, storage, movement, delivery, inspection, and vending. The parties involved are many. The documentation of rights and responsibilities used to fill a small library of paper, and now involves paper, electronic communication, and some digital information transfer. Many points of delay and potential contention persist. Can blockchain clean this up? What other technological developments are reshaping trade finance?
Part of the webinar series: Blockchain Basics 2021
See more at https://www.financialpoise.com/webinars/
TXGX 2019_Colin_Account and Transaction Model in KlaytnKlaytn
Account and Transaction Model in Klaytn
Klaytn에서는 기존의 블록체인 플랫폼들이 가지고 있던 성능/사용성에 관련된 다양한 문제들을 해결하고 있습니다. 그 중 사용성 개선을 위해 다양한 기능(변경 가능한 개인 키, 멀티시그 지원, role-based 키 지원, account/transaction type지원, 트랜잭션 수수료 대납)을 추가하였고, 이 기능추가를 위해 Account/Transaction Model을 재설계했습니다. 이 발표에서는 기존의 블록체인 플랫폼들이 가지고 있는 사용성의 문제는 무엇이었으며, Klaytn에서 그것을 개선하기 위해 어떻게 Account/Transaction Model을 재설계하였는지 소개합니다.
Accenture Security Framework for AWS: Monetary Authority of Singapore GuidelinesAccenture Operations
The Monetary Authority of Singapore (MAS) has endorsed the use of public cloud. Financial services institutions (FSIs) can help ensure their AWS implementation addresses key control guidelines by using Accenture Security Framework for AWS.
FabLab Future Trends è una ricerca sui laboratori di progettazione partecipata, partendo dalle prime esperienze degli hackerspace fino ai possibili sviluppi futuri. ABSTRACT: Il processo di progettazione ha risentito di una svolta paradigmatica, da un processo spesso individualistico o di un ristretto gruppo di persone, ci si sta muovendo verso un percorso di progettazione partecipativo continuo. Questo fenomeno necessita di un ripensamento degli spazi analogici quanto di quelli digitali. In questa ricerca si cerca di delineare una breve storia di queste sperimentazioni, dalle diverse peculiarità che le distinguono agli attori che le hanno rese possibili. In ultimo, diverse teorie e realtà innovative, cercheranno di offrire un quadro di riferimento, nella comprensione dei futuri sviluppi nel mondo design partecipato.
Unicam S.A.A.D di Ascoli Piceno
Corso di Design Computazionale
Esame di Design per l'innovazione
Professoressa Lucia Pietroni
Studente Manuel Scortichini
Quest'opera è distribuita con Licenza Creative Commons Attribuzione 4.0 Internazionale.
Traccia audio di Kevin MacLeod "Funin and Sunin".
Immagini scaricate da Freepik.
La volontà di questa ricerca è di spingere un pubblico trasversale ad un approfondimento su questo tema. Attraverso la ricerca FabLab Future Trends offro una panoramica degli argomenti a mio avviso più importanti e dei riferimenti bibliografici autorevoli.
Condividete con me le vostre osservazioni o critiche!
Grazie per l'attenzione :)
El plan de disciplina de Dos para el hermano errado by eliud gamezEliud Gamez Gomez
La disciplina del Señor es la acción que se debe tomar para que el hermano pecador sea humillado y así se salve de su pecado (1 Cor. 5:5; 2 Tes. 3:14), y para que la iglesia no sea contaminada por el pecado en su medio (1Cor. 6: 6 y sig.).
Patent Monetization: Buy, Sell, License, Hold?Erik Oliver
Given the myriad of ways companies use to monetize their patents, how do you know which choice to make? ROL Group delves into this question by looking at the different types of monetization strategies available, and balances the options based on their current market and judicial factors.
With a market capitalization of $2.03 billion, the crypto business has gone to glorious extents. Without a doubt, investors keep on pouring more cash into Bitcoin (BTC) and Ethereum (ETH). Today, there are 457 exchanging platforms across the world.
Directors at Public Interest Registry, Lauren Price & Ulrich Retzlaff give us a general overview of the changing domain name industry and how you can benefit.
The financing of the international trade of goods — and the underwriting thereof — implicate a many-staged process of manufacture, storage, movement, delivery, inspection, and vending. The parties involved are many. The documentation of rights and responsibilities used to fill a small library of paper, and now involves paper, electronic communication, and some digital information transfer. Many points of delay and potential contention persist. Can blockchain clean this up? What other technological developments are reshaping trade finance?
Part of the webinar series: Blockchain Basics 2022
See more at https://www.financialpoise.com/webinars/
How To Make BIG Profits With Short Term RentalsCharles Blair
One of the Most talked about Real Deal Meetup Event presentations is now LIVE In FULL HD quality Video & Sound.
http://bit.ly/ShortTermRentalsVideo
Brittney Calloway "How To Make BIG Profits With Short Term Rentals.
Over 3 1/2 hour of FREE Content, No BS, No Gurus Allowed
http://bit.ly/ShortTermRentalsVideo
The financing of the international trade of goods — and the underwriting thereof — implicate a many-staged process of manufacture, storage, movement, delivery, inspection, and vending. The parties involved are many. The documentation of rights and responsibilities used to fill a small library of paper, and now involves paper, electronic communication, and some digital information transfer. Many points of delay and potential contention persist. Can blockchain clean this up? What other technological developments are reshaping trade finance?
Part of the webinar series: Blockchain Basics 2021
See more at https://www.financialpoise.com/webinars/
TXGX 2019_Colin_Account and Transaction Model in KlaytnKlaytn
Account and Transaction Model in Klaytn
Klaytn에서는 기존의 블록체인 플랫폼들이 가지고 있던 성능/사용성에 관련된 다양한 문제들을 해결하고 있습니다. 그 중 사용성 개선을 위해 다양한 기능(변경 가능한 개인 키, 멀티시그 지원, role-based 키 지원, account/transaction type지원, 트랜잭션 수수료 대납)을 추가하였고, 이 기능추가를 위해 Account/Transaction Model을 재설계했습니다. 이 발표에서는 기존의 블록체인 플랫폼들이 가지고 있는 사용성의 문제는 무엇이었으며, Klaytn에서 그것을 개선하기 위해 어떻게 Account/Transaction Model을 재설계하였는지 소개합니다.
Time to update your firm wide risk assessmentJonathon Bray
A live session run by Jonathon Bray and Rachael Eyre for law firms caught by the Money Laundering Regulations. Zoom recording available to COLP Insider newsletter subscribers.
How to Select a Clearing Firm 2020: A Guide for RoboadvisorsBrian Cedeno
Instead of waiting on the sidelines as the disruption happens around them, advisors are seizing the opportunity to expand their geographic reach and attract next-generation investors.
These forward-looking advisors are now implementing robo-advisory services firmly underpinned by the human expertise that they have spent their career building – expertise that many novice investors will likely consider valuable as their needs become more complex.
The decision to launch a robo is undoubtedly an exciting one yet it represents just the first hurdle in a series of vital choices.
And, of the subsequent decisions you must make, selecting the right clearing firm for your clients’ assets is arguably among the most important.
Quickly & Safely Buy IP addresses in ARIN, APNIC and RIPE.
Fully managed transfer process
Get detailed blacklist reports, and peace of mind
visit www.brandergroup.net
visit www.ipv4connect.com
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
2. Contents
´ First we will learn a bit about the history of the market
´ Then we’ll see what a broker does and establish my bona fides
´ We will go over the ways to get IPv4
´ Learn how a deal flows
´ Provide some information useful for participants
´ Offer some warnings, predictions, and suggestions
´ Time for questions
3. Brief history of a young market
´ Pre-2010 Legacy and spammers
´ 2010-2011 Nortel/Microsoft IPv4 deal – Price paid was public information
´ 2011-2012 APNIC exhaust, Large legacy transfers, some prices were public
´ Late 2012 Inter-regional transfers begin, RIPE exhaust
´ 2013 Market picks up steam, address flows ARIN -> APNIC, RIPE Intra only
´ 2014 RIPE discusses Inter-regional policy
´ 2015 ARIN hard exhaust, ARIN/RIPE/APNIC unified market created
´ 2016 LACNIC Intra-regional transfers begin
´ 2017 AFRINIC Intra-regional transfers begin
4. My brokerage experience
´ Prior to 2010 broker of legacy addresses
´ Brokered a losing bid in the Microsoft/Nortel deal which began the market
´ Brokered first inter-regional transfer in 2012
´ Brokered over 350 completed transfers to date
´ ARIN to APNIC, ARIN to RIPE, APNIC to ARIN, APNIC to RIPE, RIPE to ARIN,
RIPE to APNIC every combination of transfers
´ Clients in 54 countries, this is a global marketplace
´ ARIN and RIPE member and resource holder, legacy address holder
´ Policy Author at ARIN and LACNIC
´ Network operator
5. What the broker does
´ Interface between buyer, seller, escrow agent, and RIR(s)
´ Get a fair deal for the client
´ Keep private information private
´ Assist in RIR interactions like document and payment requests
´ Assist in pre-sales due diligence and delisting
´ Assist in document preparation
´ Assist in funds transfers and escrow release
´ Post-sale assistance with leftover route advertisements or rdns entries
´ Assistance in needs analysis and renumbering
´ Locating and matching buyers and sellers - advertising
6. Ways to get IPv4 Today
´ Policy-compliant transfers including intra- and inter-regional
´ Entity purchase/merger
´ Leases
´ Legacy sales
´ Options
´ Access New LIR-type pools
´ Out-of-region registration for free pool- or policy-shopping
7. Standard deal process
´ Mutual Non-disclosures signed
´ Due-diligence performed by buyer
´ Price negotiated
´ Agreement executed
´ Third-party escrow agent funded by buyer
´ Seller initiates transfer request
´ Buyer and Seller cooperate with RIR(s) during transfer
´ Transfer completes, Whois updated, escrowed funds released to seller
´ If Transfer fails, escrowed funds returned to buyer, address rights to seller
8. Leasing
´ Leasing can be invisible to Whois, but does not have to be
´ SWIPS or assignment records should be created for lessees
´ Lessees get Letter of Agency to give to their ISP
´ RIR policy regarding leasing is missing
´ Different lease terms for mailers due to blacklist risk
´ Spammers lurk, ready to take advantage of hapless Lessors
´ Lessors who end up blacklisted do not have many bites at the delisting
apple. Expect to get delisted once or twice only.
´ Lease rates currently around $.50 per month for non-mailers
9. Geolocation
´ Addresses which are transferred, especially inter-regional transfers, require
proper geolocation
´ Whois Geoloc attribute allows entry of latitude and longitude, but is little
used
´ Whois Country code and location are available
´ Contact Maxmind, Google, etc. to correct their databases
´ Geolocation is really not necessarily related to anything in Whois
´ Addresses are commonly used outside of the region of registration
´ Updates take some time to process and disseminate
´ The system works even for inter-regional transfers
10. Hijack Protection
´ Sellers with available blocks may want to advertise them even if unused
´ Other providers less likely to advertise already-advertised blocks, even with
a beautiful fake Letter of Agency
´ Sellers with long-dormant blocks could get blacklisted if they pop into the
table
´ Keep your registry records up to date
´ Protect your domain
11. Registry Hijacking
´ Like normal hijacking, except instead of using the hijacked blocks to spam,
the goal is to sell the hijacked block for money
´ Bad actors find old blocks and pretend to be the listed registrant
´ Old registrations were sometimes made to individuals, trade names,
company divisions
´ Dead companies spring to life like zombies
´ Sometimes this is done legitimately by paying old filing fees
´ RIR is the decision-maker, and can reverse its decision
´ Buyers beware and carefully investigate block provenance
12. RDNS, SWIPs, Stray routes
´ Sellers should remove these entries prior to sale, but some can’t
´ Leftover routes require contacting the AS advertising
´ Some sellers unaware of these things and during the sales process learn
they are still using the odd /24 for an old circuit somewhere
´ Can take some time to clean these up, as they sometimes require third-
party participation
´ Once the block has been transferred to the buyer, the buyer can make
these deletions themselves (ARIN)
´ RIPE checks for these during the transfer and notifies participants
13. Dirty Blocks
´ Blacklisted blocks are worth less than clean blocks
´ Sellers and brokers know this and try to get delisted before sale
´ No guarantees of post-sale delisting
´ If buyer is a large and respectable company, no problems
´ But sometimes a transfer is just to another spammer and Spamhaus is aware
of this ploy
´ No leverage against Spamhaus
´ There are cases where Spamhaus will not delist
´ Sellers should remove any PBL listing before sale (voluntary listing)
´ Some buyers don’t care and look for dirty blocks to save money
14. Prices
´ I bought a legacy /24 in 2010 for $750 or $3 per address
´ Microsoft payed $11.25 in Spring 2011 for 660,000 addresses
´ Borders payed $12 for a /16 in December 2011
´ Prices dropped from their initial highs, reaching as low as the high $4 range
for very large blocks
´ Prices remained mostly stable from 2013 to 3Q 2016
´ Demand increases, supply decreases starting late 2016
´ Prices rising currently in all block sizes
´ /24s $15, /20 $12 , /16 $10 currently, with /16s in high demand
´ High demand for small blocks incentivize breakdowns of larger blocks
15. Corner Cases
´ /16 owner wants to sell, but hold onto a /24. Does not want to be left with
/17,/18,/19,/20,/21,/22,/23, and /24 though!
´ Address buyer pays premium for lucky numbers
´ Address buyer pays premium for fewest numbers in addresses
´ User wants to purchase his ISP-allocated block from the ISP. ISP says okay,
just replace it with another block of the same size. But policy restrictions
designed to prevent flipping make it impossible
´ Buyer wants one /24 from each /8
´ Trade names and individuals as registrants
´ Early proto-RIRs, owners of undelegated blocks?
´ Trade sanctions on some countries
´ Buyer must pay by credit card
16. Carrier Grade NAT
´ The only economic substitute for IPv4 is CGN
´ CGN can be deployed with customer opt-outs
´ CGN easily provides 64:1 ratio
´ TCP and UDP ports statically mapped to customers reduces logging load
´ Smaller and residential ISPs are deploying
´ Imposing CGN on customers to sell newly available addresses?
´ CGN costs provide ceiling for IPv4 prices
´ Stable IPv4 prices + CGN could mean a longer lifetime for IPv4
´ Leading to a dual-stack IPv6/CGN architecture (flat/deep)
17. Cautions
´ Address hijackings will grow more sophisticated
´ Regional or national protective policy proliferation
´ Ownership disputes and failed transfers
´ Taxes and regulation
´ Potential for corruption related to address value
´ Inside the RIR
´ Subversion of Final /8 pools
´ Spamhaus, Barracuda, et al can change block value
´ Inside the corporation, dealing with the Owner or the tech manager?
´ Techniques designed to drain remaining free pools
18. Predictions
´ Prices rise for the foreseeable future
´ Inter-regional transfer policies continue to loosen
´ Global market within a few years
´ Regional protective policies will remain
´ Needs testing fades
´ Policies intended to recover abandoned space will proliferate
´ Niche markets materialize – geolocation, sub /24 leasing, vanity
´ No pure investment or speculation plays
´ Growing market for small blocks as buyers can’t get from their ISPs anymore
19. Suggestions for Policymakers
´ Reduce incentives for out-of-policy transfers like needs tests, holding
periods, and regional restrictions
´ Avoid erecting protective policies like one-way transfers and in-country
usage requirements
´ Maintain direct stakeholder control of the IPv4 transfer market by
demonstrating it to be functional, efficient, and non-corrupt
´ Create and maintain high standards for recognized brokers, and add that
broker recognition in LACNIC and AFRINIC
´ Accept the proliferation of multi-level NAT and consider registering contact
information by port range within a single address
´ Remove any threat of revocation by RIR for lack of utilization