Post-Quantum Cryptography
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.
Guest Post: Three methods to decrypt TLS traffic, how each works, and when to use them.
Guest Post: Auditing prominent mail providers to discover how they handle email encryption and show how MTA-STS can help improve email security.
Geoff Huston discusses the market failure of DNSSEC in deployment.
Here are APNIC Blog’s top three posts related to Security for 2023.
Guest Post: How will the forthcoming TLS Encrypted Client Hello changes affect your current set of defences?
Guest Post: HSTS preload is a mitigation against a specific attack. How widely is it used?
Guest Post: When it comes to managing TLS certificates, one often-overlooked aspect is delegated domain verification.
What is challenging active network management?
NTP security, transition mechanisms, TCP delayed ACKs, alternate name systems, and more from IETF 116.