Limitless HTTP in an HTTPS World
Guest Post: Researchers have been able to identify underlying HTTP features by observing HTTPS connections.
Guest Post: Researchers have been able to identify underlying HTTP features by observing HTTPS connections.
Remote Triggered Blackholing has major limitations when applied at Internet Exchange Points.
What do we expect from protocols, and how do standards affect deployment?
DOH (DNS over HTTPS) and other means to secure the DNS attracted plenty of discussion at the recent DNS-OARC meeting.
A deeper look at the potential benefits of DNS over HTTPS, or DOH.
Guest Post: NTT Secure Platform Laboratories has discovered five previously unknown evasion techniques by using two types of honeyclients.
Guest Post: There are limits to the benefits HTTPS provides, even when deployed properly.
Guest Post: A study looking at TLS adoption in Japan finds HTTPS web traffic has increased by a factor of 14 in the last 10 years.
Is there a core of “crypto zealots” in the IETF that are pushing an extreme agenda about encryption?
Guest Post: What are the most widely used HTTPS security extensions and how are they improving HTTPS security for users?