Guest Post: While BBR is supposed to be a rate-based algorithm, when competing with other flows, BBR is window-limited.
Guest Post: New app assists with securely deploying IPv6 on Ethernet LANs.
Guest Post: The SHAmbles prefix collision attack against SHA-1 offers a new way for attackers to spook the DNS despite DNSSEC.
Guest Post: The difference between the bottleneck buffer size and bandwidth-delay product typically dictates when BBR performs well, study finds.
Guest Post: Part of the DoH-related conflicts seem to come from a different understanding of what the DNS is and what it is meant to do.
Guest Post: Investment and development towards improved access and adoption of the Internet needs to come in many forms.
Thanks to the 100+ guest bloggers who contributed stories to the APNIC Blog in 2019. Here’s three of the best!
Guest Post: Random Subdomain attacks, aka Slow Drip attacks, have morphed significantly over time and are somewhat perplexing.
Guest Post: Around one in four people who streamed the 2019 National High School Baseball Championship did so via IPv6.