Which practices help us maintain a secure cyberspace in the Asia Pacific?
Guest Post: What role does the technical community have to play when it comes to cyber norms?
Guest Post: What role does the technical community have to play when it comes to cyber norms?
Geoff Huston shares his thoughts from IETF 109, including on AS Prepending, Community Networks, DNS centrality, IPv6, and TCP.
Guest Post: Path-aware architectures are showing potential as means to improve efficiency and solve many of the security issues of today’s Internet.
Guest Post: Study shows big five content providers are at various stages of DNSSEC, IPv6 and TCP adoption.
Learn about the differences between AS0 Trust Anchor Locators and AS0 Route Origin Authorizations.
Guest Post: HTTPS RRs and STS look similar but there are subtle differences in the threat models and deployment tradeoffs of each.
APNIC’s RPKI publication service now supports the RFC 8181-aligned publication protocol and Krill system.
Guest Post: A proposal to allow Resource Tagged Attestations can be tested in Krill and Routinator with just a few simple steps.
Sunny Chendi presented on how the Internet works at the Youth IGF India 2020, held online from 30 October to 1 November 2020.
Guest Post: RIPE Atlas is inviting you to participate in their next probe deployments, from the comfort of your own home.