Technology and Innovation

All articles

Separating FUD from Practical for Post-Quantum Cryptography

Separating FUD from Practical for Post-Quantum Cryptography

Kathleen Moriarty

6 min read

A practical approach to avoid falling into fear, uncertainty, and doubt (FUD) around post-quantum cryptography breaks down into three steps. Find out more in this guest post from Kathleen Moriarty, CTO of the Center for Internet Security.

Article tags:

10 You have liked this article 0 times.
0
RIPE NCC Cloud Strategy Framework (v2)

RIPE NCC Cloud Strategy Framework (v2)

Felipe Victolla Silveira

6 min read

Our cloud strategy framework provides the principles and requirements for the cloud architecture of the RIPE NCC services. To determine these requirements, it uses the service criticality framework, more specifically its availability component rating.

Article tags:

14 You have liked this article 0 times.
0
The Climate Cost of the AI Revolution

The Climate Cost of the AI Revolution

Wim Vanderbauwhede

13 min read

ChatGPT and other AI applications such as Midjourney have pushed "Artificial Intelligence" high on the hype cycle. In this article, I want to focus specifically on the energy cost of training and using applications like ChatGPT, what their widespread adoption could mean for global CO₂ emissions, an…

Article tags:

31 You have liked this article 0 times.
0
The Joy of TXT

The Joy of TXT

Peter Lowe

10 min read

TXT records are perhaps the most flexible type of DNS records available - but have you ever wondered how they’re really used? To see if we can answer this, the TXT records of 1 million domains are examined to see if there’s any rhyme or reason as to how people employ this quirky, open-ended record …

Article tags:

44 You have liked this article 0 times.
3
SAV: Why Is Source Address Validation Still a Problem?

SAV: Why Is Source Address Validation Still a Problem?

Qasim Lone

13 min read

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

34 You have liked this article 0 times.
3
The Human Factor in the Geopolitics of the Internet

The Human Factor in the Geopolitics of the Internet

LOUIS PETINIAUD

20 min read

The Internet is a network of networks administered, controlled and shaped by humans. As such, it is as much affected by power relationships across the public and private actors as it, in turn, affects them. In this article, the team from GEODE explores the complex relations between the technical an…

Article tags:

42 You have liked this article 0 times.
0
Intercept and Inject: DNS Response Manipulation in the Wild

Intercept and Inject: DNS Response Manipulation in the Wild

Yevheniya Nosyk

6 min read

In November 2021, Internet users from Mexico lost access to whatsapp.net and facebook.com. By the time the event was reported, the underlying problem had already gone unnoticed for quite some time. Here, we present key takeaways from our analysis of the event - carried out with RIPE Atlas - and we …

Article tags:

40 You have liked this article 0 times.
0
Apply Now for Inaugural Pulse Research Fellowship

Apply Now for Inaugural Pulse Research Fellowship

2 min read

Are you interested in Internet measurements and research and have a project or tool in mind that contributes to upholding an open, globally-connected, secure, and trustworthy Internet? The Internet Society invites you to apply for the Pulse Research Fellowship.

Article tags:

9 You have liked this article 0 times.
0
Plug and Plot: Reusable Visualisations for AS-Hegemony Data

Plug and Plot: Reusable Visualisations for AS-Hegemony Data

11 min read

This article presents a set of open-source tools - “reusable visualisations” - that extend the AS hegemony visualisations provided by the Internet Health Report. Users can directly use the online tools or embed the IHR data on their own posts, webpages, or Observable HQ notebooks.

Article tags:

36 You have liked this article 0 times.
0
Help Validate ROV Adoption Measurements from RoVista

Help Validate ROV Adoption Measurements from RoVista

Tijay Chung

5 min read

Measuring adoption of ROV is challenging without direct access to routers in the wild. My colleagues and I at Virginia Tech, IIJ, RIPE NCC, and MANRS have developed a new measurement platform (RoVISTA) to measure the current deployment status of ROV. You can help by taking our survey!

Article tags:

35 You have liked this article 0 times.
0

Showing 202 article(s)