Text protocols can be read by humans, but they come with drawbacks. Do we need them?
What exactly is a ‘key ceremony’ and why are they important for trust?
Simple yet crucial ways to ensure your ROAs are functioning as they should.
The AN0M police sting, which subverted encryption, has lessons for how we think about trust on the Internet.
We often use ‘ping’ in conversation. What exactly is it, anyway?
The 8 June 2021 disruption wasn’t an infrastructure issue.
How many pieces of a treasure map need to be shared so one person alone can’t get the treasure?
A recent IETF draft warns of Atlanteans bearing eels. Believe it or not, it’s actually making a decent point.
The discovery of bad code deliberately inserted into the Linux kernel shows the value of an active community.
Spoofed packets allow senders to hide their source address. How do they work and why do they do it?