FireFly: Community-centric wildfire detection using drones and IoT sensors
Guest Post: How Project Firefly combines IoT sensors with unmanned aerial vehicles to detect forest fires in Northern Thailand before they escalate.
Guest Post: How Project Firefly combines IoT sensors with unmanned aerial vehicles to detect forest fires in Northern Thailand before they escalate.
How client applications are triggered to connect to servers using the QUIC transport protocol.
The latest measurements on APNIC’s Whois, RDAP, RPKI, IRR, and rDNS are now available.
Doug Madory shares insights from his 2025 analysis of secure BGP deployment around the world, based on Kentik’s internal measurements and global routing data.
Guest Post: How honeypot data can reveal network risks through header-only analysis of TCP SYN segments.
Inside the ceremony that safeguards global DNSSEC, and why community oversight still matters.
New support for key transitions will give RIRs greater flexibility and improve long-term resilience of the RPKI.
Guest Post: A packet-level tour through redirects, TLS negotiation, and protocol discovery.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Guest Post: A new rate limit has significantly reduced the load on Let’s Encrypt’s infrastructure.