Featured article

Andrei Robachevsky - ICP-2 In Review: Charting the RIR Lifecycle

Featured article lead image
Author image
Alun Davies

Based in Amsterdam

4 min read

ICP-2 lays out the criteria for the recognition of new RIRs. But what about the rest of the lifecycle of the organisations that coordinate the allocation and public registration of unique IP numbers? In this episode, Andrei Robachevsky of the NRO NC talks about the ICP-2 review.

Read article
31 Please read the article before liking.
0

Latest articles

Square_RIPELabs_RIPELogo_2024

The RIPE Chair Team Reports - October 2025

Author image
Mirjam Kühne

6 min read

With RIPE 91 around the corner, the RIPE Chair Team flags schedule tweaks, a new submission system, and BoFs on ICP-2, encrypted DNS, and RIPE NCC strategy. Also inside: revamped Fellowship, policy updates, and highlights from recent and upcoming industry events.

Article tags:

6 Please read the article before liking.
0
code of conduct

Announcing the First RIPE Code of Conduct Survey

Author image
Andrew McConachie

5 min read

Help shape a safer, more open RIPE community. We’re launching our first Code of Conduct survey to understand how safe people feel at RIPE meetings and how likely they are to report concerns. If you have a moment to answer five quick, anonymous questions - your input will shape what we improve next.

Article tags:

21 Please read the article before liking.
0
autocast cover

Autocast: Automatic Anycast Site Optimisation

Author image
Thijs van den Hout

16 min read

Autocast turns one round of unicast latency measurements into millisecond-accurate predictions, automatically selecting the optimal anycast locations for fast .nl response times worldwide. Pairing simulated annealing with real resolver telemetry, it delivers lean, cost-aware PoP sets - often around…

Article tags:

24 Please read the article before liking.
0
Piracy Shield

Live-Event Blocking at Scale: Effectiveness vs. Collateral Damage in Italy’s Piracy Shield

Author image
Antonio Prado

9 min read

Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements performed by researchers at the University of Twente and colleagues show broad collateral damage to legitimate services. We share the results of those measurements in the hopes of sparking a community discussion around th…

Article tags:

43 Please read the article before liking.
3
edge_cases_dnssec_pqc

Edge Cases in DNSSEC Validation with Multiple Algorithms

Author image
Arlin Kokkelmans

17 min read

As part of our research into post-quantum cryptography (PQC) for DNSSEC, we test PQC as a drop-in replacement for classical algorithms. We explore a transition where both run simultaneously, analysing how resolvers validate records, edge cases, and the feasibility and impact of such a period.

Article tags:

21 Please read the article before liking.
0
muse_cyberattack_cover

Cyber Risk Is Business Risk: Lessons from the MUSE Cyberattack

Author image
Kathleen Moriarty

5 min read

Recent disruption linked to the MUSE cyberattack shows how dependent airports are on shared IT services. This article looks at governance and network design choices that limit blast radius and keep operations running.

Article tags:

28 Please read the article before liking.
0
bgp_mrt_clickhouse_cover

Working with BGP Data

14 min read

Have you heard about MRT dumps, but never tried to use them because the bar seems too high? Or are you tired of doing “parse -> grep -> process” every time you touch BGP MRT dumps? This hands-on guide shows how to load RIS/RouteViews data into ClickHouse - covering tools, schema, and example querie…

Article tags:

20 Please read the article before liking.
0
View all articles

Latest Podcasts

Editor's Pick

  • insidethebox

    Keeping Network Sites Online During Blackouts

    Author image
    Yuriy Vykhnevych

    8 min read

    When blackouts become a frequent reality, keeping network sites online requires more than ad-hoc fixes. This article outlines a power management system, tested in practice, with design notes and an operator playbook.

    Article tags:

    263 Please read the article before liking.
    0
  • u7883176815_End-to-end_encryption_Architecturally_necessary._Lo_a137c5fd-51af-4019-8de8-e8ff1ac42385

    End-to-End Encryption: Architecturally Necessary

    Author image
    Fredrik Lindeberg

    11 min read

    Good intentions don’t always result in good outcomes. This is especially the case with recent suggestions regarding end-to-end-encryption adaptability requirements for number independent communication services. Not only is security an issue, the suggestions themselves go against the design of the I…

    Article tags:

    46 Please read the article before liking.
    0