Featured article

The IRR Landscape: Where Do ASes Keep Their Routes?

Featured article lead image
Author image
Stavros Konstantaras

Based in Amsterdam

18 min read

We map where networks actually publish routing data - across RIR-run and third-party IRRs - and how that data is used in practice. Connecting our findings with RPKI growth and exploring regional patterns, we examine legacy space and operational risks to suggest clear clean-up priorities.

Read article
10 Please read the article before liking.
0

Latest articles

khipu_use_cases_cover

Six Ways To Use Khipu To See And Solve Network Problems

Author image
Stephen Suess

8 min read

Since we launched Khipu, we’ve been working to pin down the most useful, real-world workflows. This article walks through six core use cases - from outage detection, though routing policy validation, to exploring IXPs along network paths.

Article tags:

45 Please read the article before liking.
0
CAPIF 4 Cover

CAPIF 4: Grounded in IPv6, Looking to Orbit

Author image
Anastasiya Pak

5 min read

With record-breaking participation in Almaty, CAPIF 4 rallied network operators, IXPs, policymakers, and researchers to map Central Asia’s next steps. The message was clear: accelerate IPv6, deepen interconnection and measurement for resilience, and diversify paths to keep traffic closer to home.

Article tags:

32 Please read the article before liking.
0
Square_RIPELabs_RIPELogo_2024

The RIPE Chair Team Reports - October 2025

Author image
Mirjam Kühne

6 min read

With RIPE 91 around the corner, the RIPE Chair Team flags schedule tweaks, a new submission system, and BoFs on ICP-2, encrypted DNS, and RIPE NCC strategy. Also inside: revamped Fellowship, policy updates, and highlights from recent and upcoming industry events.

Article tags:

20 Please read the article before liking.
0
code of conduct

Announcing the First RIPE Code of Conduct Survey

Author image
Andrew McConachie

5 min read

Help shape a safer, more open RIPE community. We’re launching our first Code of Conduct survey to understand how safe people feel at RIPE meetings and how likely they are to report concerns. If you have a moment to answer five quick, anonymous questions - your input will shape what we improve next.

Article tags:

21 Please read the article before liking.
0
autocast cover

Autocast: Automatic Anycast Site Optimisation

Author image
Thijs van den Hout

16 min read

Autocast turns one round of unicast latency measurements into millisecond-accurate predictions, automatically selecting the optimal anycast locations for fast .nl response times worldwide. Pairing simulated annealing with real resolver telemetry, it delivers lean, cost-aware PoP sets - often around…

Article tags:

18 Please read the article before liking.
0
Piracy Shield

Live-Event Blocking at Scale: Effectiveness vs. Collateral Damage in Italy’s Piracy Shield

Author image
Antonio Prado

9 min read

Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements performed by researchers at the University of Twente and colleagues show broad collateral damage to legitimate services. We share the results of those measurements in the hopes of sparking a community discussion around th…

Article tags:

39 Please read the article before liking.
3
edge_cases_dnssec_pqc

Edge Cases in DNSSEC Validation with Multiple Algorithms

Author image
Arlin Kokkelmans

17 min read

As part of our research into post-quantum cryptography (PQC) for DNSSEC, we test PQC as a drop-in replacement for classical algorithms. We explore a transition where both run simultaneously, analysing how resolvers validate records, edge cases, and the feasibility and impact of such a period.

Article tags:

14 Please read the article before liking.
0
View all articles

Latest Podcasts

Editor's Pick

  • insidethebox

    Keeping Network Sites Online During Blackouts

    Author image
    Yuriy Vykhnevych

    8 min read

    When blackouts become a frequent reality, keeping network sites online requires more than ad-hoc fixes. This article outlines a power management system, tested in practice, with design notes and an operator playbook.

    Article tags:

    270 Please read the article before liking.
    0
  • u7883176815_End-to-end_encryption_Architecturally_necessary._Lo_a137c5fd-51af-4019-8de8-e8ff1ac42385

    End-to-End Encryption: Architecturally Necessary

    Author image
    Fredrik Lindeberg

    11 min read

    Good intentions don’t always result in good outcomes. This is especially the case with recent suggestions regarding end-to-end-encryption adaptability requirements for number independent communication services. Not only is security an issue, the suggestions themselves go against the design of the I…

    Article tags:

    53 Please read the article before liking.
    0