The third post in this series examines the risks in BGP that make it important to ‘trust but verify’.
Twitter has begun Route Origin Authorization. Here’s what that actually means.
There are many RPKI validators to choose from. If you could mix and match features, what would your ideal validator look like?
Guest Post: What happens when one person tries to convince network operators to apply MANRS actions across the AFRINIC region?
Guest Post: How do we fix invalid RPKI routes and whose job is it?
Guest Post: RIPE NCC recently introduced ROV on their own network. How’s it going and why did they do it?
Simple yet crucial ways to ensure your ROAs are functioning as they should.
Take a deep dive into the ROA figures and the dates of training events to see how they match up.
Guest Post: Community-driven documentation makes sense of RPKI.
Guest Post: What we can learn from a major rollout, and the current state of RPKI.