Certifiably vulnerable: Using Certificate Transparency logs for target reconnaissance
Guest Post: Large-scale measurement study identifies potential threats of Certificate Transparency logs.
Guest Post: Large-scale measurement study identifies potential threats of Certificate Transparency logs.
Guest Post: Finding inconsistencies in vendor implementations of IPv6 subnet-router anycast addressing.
Guest Post: Exploring fairness in buffer allocation and packet scheduling.
Raising the technical community’s concerns about the UN Office of the Secretary-General’s Envoy on Technology’s recent comments.
The Maui wildfires have destroyed local digital infrastructure. What can be done?
The current and future economics of silicon chip fabrication.
What are the issues behind sunspots, ionisation in the atmosphere and their effects on satellite communications and terrestrial infrastructure
Guest Post: Upgrading a large network to EVPN without disruption.
Guest Post: Measuring the structure of e-gov domain names.
Guest Post: Improving local capacity with the Chennai – Andaman & Nicobar Islands Submarine Optical Fibre Cable System.