A load of old…
Is quantum computing and post-quantum cryptography really that big of a deal?
Is quantum computing and post-quantum cryptography really that big of a deal?
Five short interviews with presenters from the recent PIMF session at APRICOT 2025 in Petaling Jaya.
Geoff discusses BGP ‘zombie’ routes — routes that should have been withdrawn but persist in the routing system. He explores how these anomalies might occur and what can be done to address them.
Job Snijders discusses his global RPKI validation archive, and the annual ‘state of RPKI’ report he produces.
Geoff Huston examines the number of nameservers assigned to domains and the potentially inefficient methods used to select which one is queried.
Gautam Akiwate discusses his prize-winning paper on risks in the DNS supply chain.
Deprecating SHA-256, RSA, ECDSA, and ECDH key usage ahead of quantum computing?
The difference in scale between IPv4 and IPv6 is so vast that it’s difficult to represent clearly. Here’s one way to visualize it.
Geoff Huston discusses Post-Quantum Cryptography in Internet protocols and the DNS in particular.
APNIC extends its IPv6 resources with a second /12 allocation from IANA.