How to talk about the trust in your devices: An IRTF draft
A review of Michael Richardson’s IRTF draft, a taxonomy of operational security considerations for manufacturer installed keys and trust anchors.
A review of Michael Richardson’s IRTF draft, a taxonomy of operational security considerations for manufacturer installed keys and trust anchors.
Geoff Huston explores how DNS operates over IPv6 and the challenges of measuring it. His findings reveal interesting variances by geographic region and network, raising questions about whether IPv6-only DNS is reliable enough to guide future operational practices.
The Network Management session at APRICOT 2026 brought together four presenters to share practical, data‑driven insights into how operators can better understand and optimize their networks.
How Thai researchers are using practical measurement to inform policy, protect health, and respond to real-world challenges.
A review of Christophe Brocas’ history of Let’s Encrypt, published on his website.
Geoff Huston discusses BGP trends in 2025 and how they may reshape our understanding of BGP’s place in the Internet’s technology adoption curve.
Two groups of students from NITK discuss the work they did at the IETF 122 Bangkok hackathon, and afterwards in their WG. Professor Mohit Taliani is seeking to encourage new entrants to join IETF protocol and standards development.
Cloudflare looks at TCP flows as a ‘man-in-the-middle’ on your behalf, using a 1% global traffic sample to reveal session behaviour, congestion control, and surprising quirks of modern Internet connections.
When DNS breakage occurs and takes down your services, it points to an inadequate understanding of the interdependencies of your own complex systems.
Geoff Huston discusses protocol privacy, RFC 7258 and how APNIC Labs measures in a world of secure protocols.