Encryption breaking vs subversion: Know the difference
The AN0M police sting, which subverted encryption, has lessons for how we think about trust on the Internet.
The AN0M police sting, which subverted encryption, has lessons for how we think about trust on the Internet.
We often use ‘ping’ in conversation. What exactly is it, anyway?
The 8 June 2021 disruption wasn’t an infrastructure issue.
How many pieces of a treasure map need to be shared so one person alone can’t get the treasure?
A recent IETF draft warns of Atlanteans bearing eels. Believe it or not, it’s actually making a decent point.
The discovery of bad code deliberately inserted into the Linux kernel shows the value of an active community.
Spoofed packets allow senders to hide their source address. How do they work and why do they do it?
Low earth orbit satellite-powered Internet could be a game-changer for remote areas, but what happens when people in more populated areas want it?
APNIC has a tool which looks at malicious traffic. So let’s take a deep dive!
Whois is old and clunky. In many ways, RDAP already fulfils many of its functions. So are we ready to replace it?