A first look at the PROXY protocol and its security implications
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Guest Post: Large-scale measurement study identifies potential threats of Certificate Transparency logs.