Vulnerabilities show why STARTTLS should be avoided if possible
Guest Post: Study finds more than 40 STARTTLS-related security flaws in many different software products, both client-side and server-side.
Guest Post: Study finds more than 40 STARTTLS-related security flaws in many different software products, both client-side and server-side.
Guest Post: Study shows adding a TLS-protected email or FTP server to a network can enable cookie-stealing or cross-site scripting attacks against web servers in the same network.
RFC 9102: Trust versus credulity.
Guest Post: A free (even for commercial use), generic, TLS decryption proxy for protocols using TLS encryption.
Guest Post: QUIC combines features of TCP and TLS to speed up web object transfers, but it has its flaws. What if there was another way to combine TCP and TLS?
Guest Post: Measuring DoT from the end user, using 3200 RIPE Atlas home probes deployed at the edge, in more than 125 economies.
Guest Post: Krill has a built-in HTTPS server but you can also run a production grade webserver as a reverse proxy for easy TLS configuration and additional restrictions.
Internet infrastructure has evolved a lot since the 1980s. How well is the DNS coping with all that change?
Guest Post: For TLS server certificates, what sized RSA keys currently provide the best combination of security and performance?
The way DNS resolution is used in today’s network is changing, and it has wider implications.