IETF 105: Measurement and privacy
While encryption may help protect user privacy, for the measurement community it creates significant challenges.
While encryption may help protect user privacy, for the measurement community it creates significant challenges.
Guest Post: Researchers examine whether an adversary can deduce websites visited using a set of IP addresses originating from a user’s device.
Learn how to create an IPv6 address plan for a service provider network.
Honeypots can be useful tools for security research, teaching us about attackers’ methods.
Guest Post: The University of the South Pacific manages a number of challenges in operating, maintaining and upgrading its large and diverse network.
Guest Post: A team of researchers measured the effects of DNS Flag Day from the perspective of end entities and authoritative servers.
Guest Post: Why do recursive resolvers select certain authoritative nameservers? Can it be improved?
Guest Post: Using more than one route collection tool provides a more accurate view of network performance.
Guest Post: MalConfScan is a new malware analysis and memory forensics tool developed by JPCERT/CC to assist with incident investigations.
Guest Post: How prevalent are DoT and DoH projects, and what languages are developers using to implement them?