Banner image

Technology and Innovation

All articles

baltic sea cable cuts

Does the Internet Route Around Damage? - Baltic Sea Cable Cuts

Author image
Emile Aben

10 min read

This week's Internet cable cuts in the Baltic Sea have been widely reported, even as attempts to understand their cause and impact continue. We turn to RIPE Atlas to provide a preliminary analysis of these events and ask to what extent the Internet in the region has been resilient to them.

Article tags:

220 Please read the article before liking.
2
serial hijackers cover

Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics

Author image
Ebrima Jaw

9 min read

Serial hijackers are malicious actors that repeatedly carry out prefix hijacks on various networks, some lasting for months or years. A new study assesses the evolution of serial hijacking events since 2019 and determines what actions the technical community is taking to protect the Internet agains…

Article tags:

62 Please read the article before liking.
1
DALL-E digital window onto internet

The Internet Exchange Point: A Window Onto a Changing Internet

Author image
Flavio Luciani

6 min read

IXPs are the airports of the Internet, busy hubs connecting traffic from a multitude of networks. The Namex observatory provides a unique view of the health and stability of the Internet as it continues to grow and evolve.

Article tags:

38 Please read the article before liking.
0
gill

The Next Generation of BGP Data Collection Platforms

Author image
Thomas Holterbach

12 min read

Existing BGP data collection platforms face challenges that threaten their long-term sustainability: their data comes with enormous redundancy and significant visibility gaps. We explore a new BGP data collection paradigm, already implemented in a prototype called GILL, that could stir change for o…

Article tags:

48 Please read the article before liking.
0
cctlds_cover

ccTLD Phishing Characterisation

Author image
Giovane Moura

10 min read

Phishing attacks are, to this day, one of the most widespread and effective means of getting access to sensitive and financial data. A new study from the team from SIDN Labs combines more than 28,000 phishing domain names in a bid to improve detection and mitigation policies.

Article tags:

31 Please read the article before liking.
0
roughtime

Roughtime: Securing Time for IoT Devices

Author image
Robert Allen

4 min read

Roughtime is a draft protocol aimed at providing a secure way for IoT devices to obtain time. In this Q&A from Netnod, Marcus Dansarie, Technical Consultant at Netnod and co-author of the IETF draft on Roughtime, answers questions on why secure time is essential, the challenges for IoT devices, and…

Article tags:

19 Please read the article before liking.
0
meowmeow

Putting the MAU Into meowmeow: On Personal ASNs

Author image
Tobias Fiebig

14 min read

Is the use of personal ASNs to gain hands-on operational experience really such a bad idea, or is this one of the ways we make sure the Internet remains a place of equitable participation, expression and learning? In this guest article, Tobias Fiebig shares his views.

Article tags:

62 Please read the article before liking.
0
networks_ripe

A Comprehensive Review of RIR Policies in the Domain of AS Number Management

Author image
Nachiket Kondhalkar

4 min read

A research team at TU Delft is researching the management of AS Numbers across RIRs as well as the potential impact of the new annual maintenance fees for ASNs and we invite you to contribute.

Article tags:

22 Please read the article before liking.
0
internet_in_space

A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

Author image
Nitinder Mohan

9 min read

How does Starlink stack up against terrestrial ISPs as a global service? And exactly what factors impact its operations? A new multifaceted active and passive measurement study uncovers the good, the bad and the ugly when it comes to Starlink performance.

Article tags:

64 Please read the article before liking.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Paola Grosso: Defining a Responsible Internet

Author image
Alun Davies

2 min read

For many, the Internet is essentially a black box. We connect with other endpoints to send and receive data, but we have little insight into what happens in between. Dr Paola Grosso talks about how CATRIN seeks to provide more visibility and control so we can make more responsible decisions on how …

Article tags:

58 Please read the article before liking.
0

Showing 214 article(s)