Recognizing IXPs as critical infrastructure
Guest Post: What happens when IXPs fail and why classifying them as critical infrastructure is a necessity.
Guest Post: What happens when IXPs fail and why classifying them as critical infrastructure is a necessity.
RPKI relies on digital signatures to secure Internet routing — but these signatures could be cracked by future quantum computers. RPKI needs to upgrade to quantum-safe signatures before that day comes.
Guest Post: How Project Firefly combines IoT sensors with unmanned aerial vehicles to detect forest fires in Northern Thailand before they escalate.
Guest Post: How honeypot data can reveal network risks through header-only analysis of TCP SYN segments.
Guest Post: Personal insight into APNIC’s Policy Development Process.
Guest Post: A packet-level tour through redirects, TLS negotiation, and protocol discovery.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Guest Post: The NRO fully supports ICANN’s efforts to bring transparency and accountability to the AFRINIC election process.
Guest Post: A new rate limit has significantly reduced the load on Let’s Encrypt’s infrastructure.
Guest Post: Many AS-SETs have grown so large they effectively whitelist most of the routing table, defeating their purpose. How are AS-SETs actually used for filtering, and what can be done when they get too big?