Banner image

Technology and Innovation

All articles

legal_ai.jpg

Artificial Intelligence and Policy-Making Developments – Council of Europe’s CAHAI

Author image
Athina Fragkouli

5 min read

As the first in a series of articles aimed at exploring how policy-making institutions are reacting to challenges posed by Artificial Intelligence (AI), we look at how the Council of Europe seeks to examine the feasibility of a legal framework for the development, design and application of AI.

Article tags:

51 Likes are disabled for this article.
0
new_dot.png

Measuring DNS over TLS from the Edge: Adoption, Reliability and Response Times

Author image
Trinh Viet Doan

9 min read

DNS over TLS (DoT) is an extension to the DNS over UDP/53 (Do53) protocol, which provides additional confidentiality to the DNS messages between client and server. Since its standardisation in RFC7858 in 2016, DoT has gained increasing support by various DNS services as well as operating systems. …

Article tags:

28 Likes are disabled for this article.
0
Trufflehunter: A New Tool to Sniff Out DNS Usage

Trufflehunter: A New Tool to Sniff Out DNS Usage

Author image
Audrey Randall

4 min read

Measuring domain usage on centralised public DNS resolvers can be very useful, but it's also pretty hard to do. Trufflehunter is a new open source tool that puts snooping techniques to good use in order to accurately estimate the popularity of domains.

Article tags:

19 Likes are disabled for this article.
0
Live Blogging from FOSDEM2021

Live Blogging from FOSDEM2021

Author image
Vesna Manojlovic

21 min read

FOSDEM is the largest European Free and Open Source Software developers conference. During the first weekend of February, thousands of volunteers flock to Brussels... but in 2021, as any other event, it has gone virtual. I am participating and want to share my impressions with the RIPE community in…

Article tags:

0 Likes are disabled for this article.
0
Remote Chaos Experience 2020

Remote Chaos Experience 2020

Author image
Vesna Manojlovic

4 min read

There is a substantial overlap between RIPE and CCC communities. In this post, I highlight talks from the most recent event that might be inspirational and useful to our readers.

Article tags:

0 Likes are disabled for this article.
2
gulf.png

RIPE NCC Internet Country Report: Gulf Region

Author image
Suzanne Taylor

4 min read

We examine the Internet landscape in eight different countries in the Gulf region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

4 Likes are disabled for this article.
1
Mapping Concentrations of Device Vendors in IXPs

Mapping Concentrations of Device Vendors in IXPs

Author image
Joao M. Ceron

7 min read

Internet exchange points (IXPs) are among the most popular ways for Internet service providers (ISPs) and content distribution networks (CDNs) to exchange traffic. This article gives an analysis of the distribution of vendors chosen by IXP members to connect to IXPs.

Article tags:

3 Likes are disabled for this article.
1
DNSSEC: The Long and Bumpy Road of Algorithm Deployment

DNSSEC: The Long and Bumpy Road of Algorithm Deployment

Author image
Moritz Müller

7 min read

As cryptographic analysis and related technologies advance, the signing algorithms at the heart of DNSSEC have to keep up. Moritz Müller and colleagues take a look at barriers on the road to more secure algorithms and discuss ways to make the journey faster.

Article tags:

0 Likes are disabled for this article.
0
How Centralised is DNS Traffic Becoming?

How Centralised is DNS Traffic Becoming?

Author image
Giovane Moura

14 min read

There have been growing concerns over the last few years about the excessive concentration of control over the Internet's markets and infrastructure — what is commonly referred to as Internet centralisation. In this article, Giovane Moura talks about how he and his colleagues have been measuring ce…

Article tags:

15 Likes are disabled for this article.
0
Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers

Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers

Author image
Yevheniya Nosyk

6 min read

Source Address Validation (SAV) is the best current practice (BCP 38/RFC 2827) aimed at filtering packets based on source IP addresses at the network edge. In this article, we show how to identify networks that do not deploy SAV for incoming traffic.

Article tags:

0 Likes are disabled for this article.
1

Showing 216 article(s)