Journeys in hosting 1/x — Precomputed SSH host keys
Guest Post: An investigation into LightNode’s curious use of precomputed SSH host keys — a small operational quirk with security implications.
Guest Post: An investigation into LightNode’s curious use of precomputed SSH host keys — a small operational quirk with security implications.
Guest Post: New research from IIT Kanpur uses the CosmicDance tool and RIPE Atlas data to uncover how the May 2024 superstorm impacted LEO satellites and user connectivity.
In 2025, the NRO RPKI Program advanced routing security with a new Trust Anchor draft, joint RPKI guidance, and a coordinated roadmap for full ASPA support by 2026.
Guest Post: How formal specifications can make network protocols more reliable, secure, and interoperable.
Guest Post: New research shows how rapid path changes in mega-constellations like Starlink can mislead conventional CCAs, and introduces LeoCC as a more robust alternative.
Guest Post: Why we developed our own API security monitoring system, how it works, and what benefits it delivers.
Guest Post: Insights from 70 data breaches and the creation of CISO Challenge, a simulation that helps leaders see how the right security foundations can make or break a company.
Guest Post: The APNIC SIG Guidelines are being reviewed to ensure they remain relevant, transparent, and aligned with community expectations. This is your opportunity to propose updates, help shape how SIGs operate, and strengthen participation.
Guest Post: Eunju Kang shares highlights from a deep dive into the impact of solar storms on LEO satellite networks measured using RIPE Atlas probes.
Guest Post: A comprehensive checklist of considerations you can use as a starting point when designing your network edge.