This week, the European Commission published a call for the development of its own DNS resolution system, provisionally dubbed DNS4EU. In its proposal, the organization establishes the guidelines that must be met by the projects aspiring to consideration, in addition to confirming that its objective is to consolidate its own DNS resolution system, since this work currently falls on a few companies, which they consider inconvenient in terms of security.
At the moment, most of the requirements set by the Commission are standard. Below is a list of the main requirements of the project, published in the document EU’s Cybersecurity Strategy for the Digital Decade:
- High adoption rate through targeting the entire European Union as a customer base
- High reliability and uptime
- Low DNS resolution latency
- Wide accessibility
- Option to access paid services for greater security
- Parental control filtering services
- Compliance with the General Data Protection Regulation (GDPR)
- A federated infrastructure spread throughout the European Union
- State-of-the-art protection against malware, phishing and other cybersecurity threats
- Full IPv6 support
- No monetization of personal data
- Automatic blocking of illegal platforms
Although the project was well received by governments in the European Union, some specialists have pointed out that this is an impractical plan and will not represent significant changes in the user experience. On the other hand, an editorial published in TorrentFreak questions why this new DNS infrastructure would offer better security options to customers with paid subscriptions, being a service that would be managed by the government.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.