Post-Quantum Cryptography
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.
Guest Post: Recently, a substantial BGP hijack went almost completely unnoticed. Why is that?
Global IPv6 adoption shows a linear trend, with varying progress across economies, prompting questions about the driving factors and their implications.
Guest Post: Lessons learned during TCC’s IPv6 deployment.
Guest Post: Accelerating IPv6 adoption with multiple models of deployment.
Guest Post: The evolution of network security and forthcoming challenges.
How TCP interacts with the characteristics of the Starlink service.
Guest Post: Introducing a novel technique for email spoofing.
Measuring DNS resolver compliance with UDP response truncation standards.
Guest Post: Researchers uncover and investigate ‘the worst attack on DNS ever discovered’.