Guest Post: TLS 1.3 is an example of how Internet technology is developed and refined by a small number of players.
ROV measurement, DANE Portal, IPv6 extension headers, congestion control, and more topics of interest from IETF 114.
What will happen if the load on CT logs grows?
Guest Post: TCPLS takes advantage of decades of performance optimizations made to TCP and has also a few other tricks up its sleeves.
Guest Post: Study shows that most consumer IoT devices rely on TLS 1.2; few have upgraded to TLS 1.3.
Does X.509 certificate revocation work as intended, or even work at all?
Guest Post: Study finds that TCP SYN-ACK is not an accurate indicator of service presence because of middlebox responses.
Guest Post: Google, Facebook and Netflix have invested heavily in deploying servers deep inside other networks over the past seven years.
Guest Post: Study finds more than 40 STARTTLS-related security flaws in many different software products, both client-side and server-side.
Guest Post: Study shows adding a TLS-protected email or FTP server to a network can enable cookie-stealing or cross-site scripting attacks against web servers in the same network.