Ten years of Let’s Encrypt
A review of Christophe Brocas’ history of Let’s Encrypt, published on his website.
A review of Christophe Brocas’ history of Let’s Encrypt, published on his website.
Guest Post: Research shows the threat vector introduced by transparent DNS forwarders that enable access to shielded recursive resolvers, and scale better in terms of potential attack volume.
Guest Post: RDAP, the more modern replacement for whois, has matured, and adoption is growing rapidly.
A trick that lets you map an IP address to an ASN without preprocessing any data.
Guest Post: AZIZA demonstrates how networking research can build systems that remain meaningful when continuity disappears.
Guest Post: NetGent is a deterministic, UI-agnostic workflow engine for generating consistent application traffic at scale, even as interfaces change.
Geoff Huston discusses BGP trends in 2025 and how they may reshape our understanding of BGP’s place in the Internet’s technology adoption curve.
Guest Post: This post explores how different economies approach LEO satellite regulation, why these choices matter, and what a balanced, future-proof framework should look like.
Guest Post: How distributed forwarding and modern data plane architectures enable routers and AI fabrics to scale reliably and handle massive workloads without single points of failure.
Guest Post: An inference method that exploits the spatial correlation between a network prefix’s origin, and the location of the router that attaches a location community.