An Italian case study: Collateral damage from live-event site blocking with Piracy Shield
Guest Post: Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements show broad collateral damage to legitimate services.
Guest Post: Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements show broad collateral damage to legitimate services.
Guest Post: Analysing the mechanics of stealthy BGP hijacking with a topology-aware risk assessment and long-term monitoring.
Geoff Huston discusses the problem of Geolocation and Starlink, with mis-attribution of traffic to economies an increasing concern.
Guest Post: Flow control is a fundamental concept in the design of high-performance networks. In part one of this three-part deep dive series, we look at the principles of flow control.
Guest Post: How ccTLDs handle global traffic and DDoS risks.
Free-air laser communications could overcome path problems confronting network infrastructure and help address the ‘last mile’ delivery problem.
Guest Post: Automatically selecting the optimal anycast locations for fast .nl response times worldwide.
Guest Post: The Happy Eyeballs algorithm supports IPv6 deployment by giving clients the ability to prefer IPv6, quickly fall back to IPv4 when necessary, and protect the user experience in either case. But how widely is it implemented?
Guest Post: Cross-disciplinary efforts lead to sharper decisions and stronger outcomes during disruptions.
Guest Post: We stand at the brink of another revolution shaping itself in the form of the quantum Internet. This post shares highlights from a paper surveying the fundamental concepts of the quantum Internet.