Technology and Innovation

All articles

SAV: Why Is Source Address Validation Still a Problem?

SAV: Why Is Source Address Validation Still a Problem?

Qasim Lone

13 min read

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

34 You have liked this article 0 times.
3
The Human Factor in the Geopolitics of the Internet

The Human Factor in the Geopolitics of the Internet

LOUIS PETINIAUD

20 min read

The Internet is a network of networks administered, controlled and shaped by humans. As such, it is as much affected by power relationships across the public and private actors as it, in turn, affects them. In this article, the team from GEODE explores the complex relations between the technical an…

Article tags:

42 You have liked this article 0 times.
0
Intercept and Inject: DNS Response Manipulation in the Wild

Intercept and Inject: DNS Response Manipulation in the Wild

Yevheniya Nosyk

6 min read

In November 2021, Internet users from Mexico lost access to whatsapp.net and facebook.com. By the time the event was reported, the underlying problem had already gone unnoticed for quite some time. Here, we present key takeaways from our analysis of the event - carried out with RIPE Atlas - and we …

Article tags:

40 You have liked this article 0 times.
0
Apply Now for Inaugural Pulse Research Fellowship

Apply Now for Inaugural Pulse Research Fellowship

2 min read

Are you interested in Internet measurements and research and have a project or tool in mind that contributes to upholding an open, globally-connected, secure, and trustworthy Internet? The Internet Society invites you to apply for the Pulse Research Fellowship.

Article tags:

9 You have liked this article 0 times.
0
Plug and Plot: Reusable Visualisations for AS-Hegemony Data

Plug and Plot: Reusable Visualisations for AS-Hegemony Data

11 min read

This article presents a set of open-source tools - “reusable visualisations” - that extend the AS hegemony visualisations provided by the Internet Health Report. Users can directly use the online tools or embed the IHR data on their own posts, webpages, or Observable HQ notebooks.

Article tags:

36 You have liked this article 0 times.
0
Help Validate ROV Adoption Measurements from RoVista

Help Validate ROV Adoption Measurements from RoVista

Tijay Chung

5 min read

Measuring adoption of ROV is challenging without direct access to routers in the wild. My colleagues and I at Virginia Tech, IIJ, RIPE NCC, and MANRS have developed a new measurement platform (RoVISTA) to measure the current deployment status of ROV. You can help by taking our survey!

Article tags:

35 You have liked this article 0 times.
0
Your Quantum Internet Hackathon Report for 2022

Your Quantum Internet Hackathon Report for 2022

Anastasiya Pak

3 min read

On 1-2 December 2022, together with the partners, the RIPE NCC organised a Quantum Internet Hackathon in Amsterdam, Dublin, Padua, Poznan, Sarajevo and online! It was great fun to work on the challenges and explore the mysteries of the Quantum Internet.

Article tags:

15 You have liked this article 0 times.
0
Chris Amin: RIPE IPmap - Geolocating Routes Across the Internet

Chris Amin: RIPE IPmap - Geolocating Routes Across the Internet

Alun Davies

2 min read

Geolocation providers usually focus on locating end user devices at the edge of the Internet. But what about the machines that make up the infrastructure in the middle? In this episode, Chris Amin talks about RIPE IPmap - an API developed by the RIPE NCC to geolocate core Internet infrastructure.

Article tags:

85 You have liked this article 0 times.
2
RIPE NCC Internet Country Report: The Nordic Region

RIPE NCC Internet Country Report: The Nordic Region

Suzanne Taylor

5 min read

We take a comprehensive look at the five countries and three autonomous regions that make up the Nordic Region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

37 You have liked this article 0 times.
0
Open-Source Software vs. the Proposed Cyber Resilience Act

Open-Source Software vs. the Proposed Cyber Resilience Act

Maarten Aertsen

16 min read

The team over at NLnet Labs is closely following a legislative proposal by the European Commission affecting almost all hardware and software on the European market. The Cyber Resilience Act (CRA) intends to ensure cybersecurity of products with digital elements by laying down requirements and obli…

Article tags:

32 You have liked this article 0 times.
0

Showing 188 article(s)