Weaponizing middleboxes for TCP reflected amplification
Guest Post: Researchers show how middleboxes and censorship infrastructure can be abused to launch reflected DoS amplification attacks over TCP.
Guest Post: Researchers show how middleboxes and censorship infrastructure can be abused to launch reflected DoS amplification attacks over TCP.
Che-Hoo Cheng participated as a panellist at the Asia Pacific Youth IGF, held online from 17 to 20 September 2021.
Guest Post: SCION is a clean-slate architecture, overcoming limitations of today’s IP and BGP-based Internet.
Guest Post: Institutions that run their own recursive resolvers and route from their own AS are most susceptible to privacy risks.
Guest Post: Maintaining an accurate inventory of active IP addresses is critical for security.
How do we engineer a shared network that can meet all service and experience parameters at the same time?
Adli Wahid participated as a moderator and speaker at the ITU Global Cyberdrill 2021, held online from 15 to 23 September 2021.
Guest Post: Bangladesh’s Janata Wi-Fi project is solving high mobile Internet prices with tea stall vendors and custom technology.
Geoff Huston and Che-Hoo Cheng presented at HKNOG 10.0, held online on 10 September 2021.
Guest Post: Looking for a way to improve privacy and security of your DNS? Run it through Tor.