Banner image

RIPE NCC

Latest articles

nro_rirs

A Solution to Concerns on the Current RPKI Trust Anchor Configuration

Author image
Sofía Silva Berenguer

3 min read

Representatives of the five RIRs propose RPKI Trust Anchor constraints - a draft RPKI protocol that binds each trust anchor to its rightful resources, enabling safe inter-RIR transfers and so closing a long-standing validation gap.

Article tags:

7 Please read the article before liking.
0
sdg_ncc_cover

Enabling Sustainable Development Through Internet Coordination

Author image
Hisham Ibrahim

9 min read

The path to sustainable development runs through the Internet’s technical core. Beneath every digital service, every collaboration, and every step forward in how societies grow and adapt lies the infrastructure that supports progress in education, healthcare, governance, innovation, and more. The R…

Article tags:

35 Please read the article before liking.
0
irr cover

The IRR Landscape: Where Do ASes Keep Their Routes?

Author image
Stavros Konstantaras

18 min read

We map where networks actually publish routing data - across RIR-run and third-party IRRs - and how that data is used in practice. Connecting our findings with RPKI growth and exploring regional patterns, we examine legacy space and operational risks to suggest clear clean-up priorities.

Article tags:

75 Please read the article before liking.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Andrei Robachevsky - ICP-2 In Review: Charting the RIR Lifecycle

Author image
Alun Davies

4 min read

ICP-2 lays out the criteria for the recognition of new RIRs. But what about the rest of the lifecycle of the organisations that coordinate the allocation and public registration of unique IP numbers? In this episode, Andrei Robachevsky of the NRO NC talks about the ICP-2 review.

Article tags:

58 Please read the article before liking.
0

All articles

Piracy Shield

Live-Event Blocking at Scale: Effectiveness vs. Collateral Damage in Italy’s Piracy Shield

Author image
Antonio Prado

9 min read

Italy’s Piracy Shield blocks IPs and domains within minutes, but measurements performed by researchers at the University of Twente and colleagues show broad collateral damage to legitimate services. We share the results of those measurements in the hopes of sparking a community discussion around th…

Article tags:

39 Please read the article before liking.
3
CA 2025 cover

CAPIF 4: Advancing Internet Technologies in Central Asia

Author image
Qasim Lone

13 min read

Ahead of CAPIF 4, we once again pause to examine the latest in Central Asia’s digital transformation. Against a backdrop of deepening regional cooperation, we chart improvements in routing security and IPv6 adoption, while also probing interconnection patterns as seen in K-root data.

Article tags:

59 Please read the article before liking.
0
OAuth 2

OAuth 2.0 Available for the RIPE Database

Author image
Adonis Stergiopoulos

2 min read

Starting this week, RIPE NCC members can use OAuth 2.0 to authenticate applications that interact with the RIPE Database. This requested feature supports secure delegated access, allowing third parties to make changes to database objects without exposing user credentials.

Article tags:

22 Please read the article before liking.
0
visualisation example

Khipu: Prototype RIPE Atlas Traceroute Visualisation Tool

Author image
Stephen Suess

5 min read

The RIPE Atlas team is developing a new tool for traceroute visualisations that should make analysing large traceroute measurements much clearer and easier.

Article tags:

60 Please read the article before liking.
0
IP report 2 - transfers cover

The State of IPv4 and the Evolving Transfer Landscape

Author image
Anastasiya Pak

2 min read

The second in our series of IP reports explores the evolving role of IPv4 transfers as a necessary mechanism for managing address space in a post-exhaustion environment, alongside broader trends in availability, pricing, and usage. The report also highlights the operational and policy context in wh…

Article tags:

43 Please read the article before liking.
2
internet_layers

Why Effective Digital Governance Begins with Understanding the Internet Itself

Author image
Hisham Ibrahim

13 min read

Effective digital governance begins with understanding the layered systems that make it possible. Technical coordination keeps the Internet running, Internet governance shapes how we use it, and digital governance steers how technology transforms society. Confusing these roles risks undermining all…

Article tags:

57 Please read the article before liking.
2

Showing 324 article(s)

Previous
1 2 3 ... 33
Next