Nation states with autonomous internet or turn-off to www....will it work? What is the influence ?
I think its good to look for the possibility to have central authority to the world's internet infrastructure rather having autonomous internet or disconnect to internet by sovereign states for reasons like protect from illicit usage and hacking.
If a country is trying to build a fully autonomous internet , what would be the major component required? Is it own alternative DNS!!!! ???...
The Chinese have invested in espionage for years, and this is very unlikely to change at all, given their successes. If the Chinese work on a 100 year span, a lot can change in that time - but I remain firmly cynical as to their real intentions.
This is no different than a war situation, whereby all radio transmitters are confiscated or jammed - however it is far simpler to simply remove the ability to communicate via the Internet centrally, by simply issuing an edict.
we are seeing a kindlier, more gentler China emerging. Recently, Chinese President Xi Jinping said during his keynote at the World Internet Conference that China would like to work together with the international community
To quote John Cleese, "explain to me the logic underlyin' that statement." a) It's a bit disingenuous, particularly when, in your immediately following post, you note that Russia and Putin is/are not to be trusted.
b) If you read the details of Fearless Leader's proposal, you will find that he is not offering to open up China, but, rather, expecting everyone else in the world to follow and support the rules of the Great Firewall of China.
Rachel, it's good, and even helpful, that you are joining Yves and Mark in posting news items. But you might want to do a bit more a) analysis of the story, and b) analysis of the source, before you do post ...
Other posts: https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413
This message may or may not be governed by the terms of http://www.noticebored.com/html/cisspforumfaq.html#Friday or https://blogs.securiteam.com/index.php/archives/1468