DNS Query Privacy revisited
In August 2019, 3% of users passed their queries through resolvers that actively work to minimize the extent of leakage of superfluous information in DNS queries. What’s changed in 12 months?
In August 2019, 3% of users passed their queries through resolvers that actively work to minimize the extent of leakage of superfluous information in DNS queries. What’s changed in 12 months?
Guest Post: There are some notable differences in where Top Level Domain Registries and Regional Internet Registries are at with deploying Route Origin Authorizations.
Guest Post: How can eXpress Data Path be used to deliver open and reliable solutions for core protocols in the DNS?
Guest Post: There’s a lot more to DNS Statistics Collector than its current DNS checks and balance application, writes Jerry Lundström.
The WIDE Project, JPRS and APNIC will work together to expand M-Root DNS services in the Asia Pacific.
Guest Post: With 70% of market share, Chromium has had a significant impact on the total root DNS traffic.
Geoff shares his thoughts from the recent DNS-OARC virtual meeting.
Guest Post: Expecting firewalls and gateways to secure DNS traffic is folly in today’s Internet. Instead, we need a more resilient approach.
Guest Post: Canonical Name (CNAME) cloaking is a new measurement technique to circumvent third-party browser extensions.
Guest Post: About 3% of the domain names requested by the NTP pool are invalid, and almost all the invalid domain names have never provided time synchronization services.