Is it really always the DNS?
When DNS breakage occurs and takes down your services, it points to an inadequate understanding of the interdependencies of your own complex systems.
When DNS breakage occurs and takes down your services, it points to an inadequate understanding of the interdependencies of your own complex systems.
Guest Post: An investigation into LightNode’s curious use of precomputed SSH host keys — a small operational quirk with security implications.
Guest Post: New research from IIT Kanpur uses the CosmicDance tool and RIPE Atlas data to uncover how the May 2024 superstorm impacted LEO satellites and user connectivity.
Are IP addresses the right tool for determining location? Examining location from the perspectives of geolocation providers, CDNs, content intermediaries, RIRs, satellite operators, and other stakeholders.
In 2025, the NRO RPKI Program advanced routing security with a new Trust Anchor draft, joint RPKI guidance, and a coordinated roadmap for full ASPA support by 2026.
APNIC’s DASH platform has introduced a new Potential Security Vulnerabilities service to help Members identify and fix network weaknesses before they can be exploited.
Geoff Huston discusses protocol privacy, RFC 7258 and how APNIC Labs measures in a world of secure protocols.
Eight long held and common beliefs about the network have been shown, time after time, to be false. What are they, and what do they mean?
Guest Post: How formal specifications can make network protocols more reliable, secure, and interoperable.
Key findings from the China IPv6 Development Report (2025), released by the Expert Committee for Promoting Large-Scale IPv6 Deployment and Application.