Technology and Innovation

All articles

BEREC Report on the IP Interconnection Ecosystem

BEREC Report on the IP Interconnection Ecosystem

Christoph Mertens

4 min read

Following on from their earlier call for input, BEREC have now released a draft report on the IP interconnection ecosystem. Take a look at their findings and contribute by sending your feedback.

Article tags:

10 You have liked this article 0 times.
0
Whose CIDR Is It Anyway?

Whose CIDR Is It Anyway?

Jan Schaumann

22 min read

IP address space wasn't divided evenly, and after years of re-allocation and re-assigment, the question that comes to mind is: who owns what parts of it? In the latest in a series of articles on the centralisation of the Internet, Jan Schaumann digs into the data to try to get a clearer view.

Article tags:

80 You have liked this article 0 times.
3
Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Peter Thomassen

7 min read

At the RIPE DNS Hackathon 2023, a group of DNS enthusiasts started writing implementations of the Authenticated DNSSEC Bootstrapping protocol. After the event, the work continued, culminating in the completion of a module for Knot DNS. So what problem does the new feature address, and how can you u…

Article tags:

20 You have liked this article 0 times.
0
Collaborative DDoS Mitigation: From Research to Operational Practice

Collaborative DDoS Mitigation: From Research to Operational Practice

Thijs van den Hout

11 min read

Distributed denial-of-service (DDoS) attacks continue to plague the Internet and pose a risk to the availability of critical digital systems that we increasingly depend on in our daily lives. Thijs van den Hout and his colleagues outline their contributions and lessons learned from 5 years of resea…

Article tags:

51 You have liked this article 0 times.
0
Bert Hubert: Internet Privacy and the Cost of Losing Control

Bert Hubert: Internet Privacy and the Cost of Losing Control

Alun Davies

2 min read

Internet users, the companies who sell us our devices, and governments are all caught up in the struggle for online privacy. In this episode, Bert Hubert explains how outsourcing and other market forces determine the flow of control over personal data and why we need to understand the consequences.

Article tags:

256 You have liked this article 0 times.
0
Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Haya Schulmann

7 min read

Dangling DNS records are a target for bad actors, but distinguishing malicious from legitimate changes in resources isn't always easy. The team from ATHENE report on the main findings of their research into the abuse of dangling resources in the cloud.

Article tags:

48 You have liked this article 0 times.
0
Geoff Huston: Starlink and the Future of Low-Orbit Internet

Geoff Huston: Starlink and the Future of Low-Orbit Internet

Anastasiya Pak

1 min read

Starlink's megaconstellations deliver broadband Internet to customers around the globe. But while the tech promises to democratise Internet access, it's not always clear how existing protocols and regulations apply beyond the clouds. In this episode, Geoff Huston talks about the future of low-orbit…

Article tags:

108 You have liked this article 0 times.
0
Internet Sanctions on Russian Media: Diverging Actions and Mixed Effects

Internet Sanctions on Russian Media: Diverging Actions and Mixed Effects

Moritz Müller

10 min read

EU sanctions on Russian controlled content require ISPs in member states to block access to websites. But our research reveals that their implementation varies widely, both between and within individual EU member states, raising important questions about their effectiveness.

Article tags:

52 You have liked this article 0 times.
0
NTP Pool - The Internet Timekeeper

NTP Pool - The Internet Timekeeper

Giovane Moura

12 min read

The NTP Pool is a network of volunteer-run servers providing time synchronisation services to millions of computers over the Internet using the Network Time Protocol (NTP). But how does it map clients to NTP servers? And why are some clients more equal than others? The team at SIDN Labs investigate…

Article tags:

72 You have liked this article 0 times.
2
Measuring NAT64 Usage in the Wild

Measuring NAT64 Usage in the Wild

Elizabeth Boswell

7 min read

With IPv4 address space depleted, it's increasingly important to transition to IPv6. IPv6 transition mechanisms, which allow the two protocols to interoperate, can help. One such mechanism is NAT64. We use RIPE Atlas to measure the usage of NAT64, and compare NAT64 paths to native IPv4 paths.

Article tags:

62 You have liked this article 0 times.
0

Showing 202 article(s)