Banner image

Technology and Innovation

All articles

cctlds_cover

ccTLD Phishing Characterisation

Author image
Giovane Moura

10 min read

Phishing attacks are, to this day, one of the most widespread and effective means of getting access to sensitive and financial data. A new study from the team from SIDN Labs combines more than 28,000 phishing domain names in a bid to improve detection and mitigation policies.

Article tags:

31 Please read the article before liking.
0
roughtime

Roughtime: Securing Time for IoT Devices

Author image
Robert Allen

4 min read

Roughtime is a draft protocol aimed at providing a secure way for IoT devices to obtain time. In this Q&A from Netnod, Marcus Dansarie, Technical Consultant at Netnod and co-author of the IETF draft on Roughtime, answers questions on why secure time is essential, the challenges for IoT devices, and…

Article tags:

19 Please read the article before liking.
0
meowmeow

Putting the MAU Into meowmeow: On Personal ASNs

Author image
Tobias Fiebig

14 min read

Is the use of personal ASNs to gain hands-on operational experience really such a bad idea, or is this one of the ways we make sure the Internet remains a place of equitable participation, expression and learning? In this guest article, Tobias Fiebig shares his views.

Article tags:

62 Likes are disabled for this article.
0
networks_ripe

A Comprehensive Review of RIR Policies in the Domain of AS Number Management

Author image
Nachiket Kondhalkar

4 min read

A research team at TU Delft is researching the management of AS Numbers across RIRs as well as the potential impact of the new annual maintenance fees for ASNs and we invite you to contribute.

Article tags:

22 Likes are disabled for this article.
0
internet_in_space

A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

Author image
Nitinder Mohan

9 min read

How does Starlink stack up against terrestrial ISPs as a global service? And exactly what factors impact its operations? A new multifaceted active and passive measurement study uncovers the good, the bad and the ugly when it comes to Starlink performance.

Article tags:

64 Likes are disabled for this article.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Paola Grosso: Defining a Responsible Internet

Author image
Alun Davies

2 min read

For many, the Internet is essentially a black box. We connect with other endpoints to send and receive data, but we have little insight into what happens in between. Dr Paola Grosso talks about how CATRIN seeks to provide more visibility and control so we can make more responsible decisions on how …

Article tags:

58 Likes are disabled for this article.
0
nodes and connections

20 Years of Inferring Interdomain Routing Policies

Author image
Savvas Kastanakis

9 min read

As the structure of the Internet has become ever flatter over time, what effect has this had on the dynamics of inter-domain routing? A new study examines whether 20-year-old insights into the characteristics of routing policies still hold.

Article tags:

61 Likes are disabled for this article.
0
BEREC

BEREC Report on the IP Interconnection Ecosystem

Author image
Christoph Mertens

4 min read

Following on from their earlier call for input, BEREC have now released a draft report on the IP interconnection ecosystem. Take a look at their findings and contribute by sending your feedback.

Article tags:

10 Likes are disabled for this article.
0
blocks

Whose CIDR Is It Anyway?

Author image
Jan Schaumann

22 min read

IP address space wasn't divided evenly, and after years of re-allocation and re-assigment, the question that comes to mind is: who owns what parts of it? In the latest in a series of articles on the centralisation of the Internet, Jan Schaumann digs into the data to try to get a clearer view.

Article tags:

80 Likes are disabled for this article.
3
Netnod-Hackathon-Banner-1-1200x580

Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Author image
Peter Thomassen

7 min read

At the RIPE DNS Hackathon 2023, a group of DNS enthusiasts started writing implementations of the Authenticated DNSSEC Bootstrapping protocol. After the event, the work continued, culminating in the completion of a module for Knot DNS. So what problem does the new feature address, and how can you u…

Article tags:

21 Likes are disabled for this article.
0

Showing 220 article(s)