Banner image

Technology and Innovation

All articles

telescope_log4shell

Log4Shell Through the Scope of a Reactive Network Telescope

Author image
Raphael Hiesgen

6 min read

The omnipresence of software introduces a constant threat of new vulnerabilities that affect widely-deployed implementations. At the end of 2021, the Log4Shell vulnerability (CVE-2021-44228) made headlines. In this article, read more about Log4Shell as seen from a reactive network telescope.

Article tags:

19 Likes are disabled for this article.
0
quantum_int_hackathon

Take part in the Quantum Internet Hackathon 2022

Author image
Karla White

7 min read

The RIPE NCC is co-organising a Quantum Internet Hackathon simultaneously in five nodes on 1-2 December 2022. Join us in Amsterdam, Dublin, Padua, Poznan, Sarajevo - and online!

Article tags:

58 Likes are disabled for this article.
0
button

Push the Button: SIDN Lab's DDoS Testbed in Action at CONCORDIA Open Door 2022

Author image
Thijs van den Hout

7 min read

Over the past months, SIDN Labs have been improving the testbed they developed for the DDoS Clearing House. At the CONCORDIA Open Door event (COD2022) this October, they'll demonstrate how the testbed works as part of the CONCORDIA Threat Intelligence Platform. The team look at the latest changes t…

Article tags:

26 Likes are disabled for this article.
0
odd_block

240/4 As Seen by RIPE Atlas

Author image
Qasim Lone

11 min read

In this article we use data from RIPE Atlas probes to investigate the usage of 240/4, a block of IPv4 addresses 'reserved for future use', formally known as Class E in the wild.

Article tags:

121 Likes are disabled for this article.
2
sdia_softawere

Competition: Environmental Impact of Open-source (23 September 2022)

Author image
Max Schulze

3 min read

The Sustainable Digital Infrastructure Alliance e.V. (SDIA) and the German Environmental Protection Agency (UBA) invite the open-source community to spend an afternoon measuring and reducing the environmental impact of popular open-source libraries and tools. Together we hope to make a positive con…

Article tags:

19 Likes are disabled for this article.
0
ooni

Measuring Encrypted-DNS Censorship Using OONI Probe

Author image
Simone Basso

13 min read

In this article we talk through the preliminary results of an encrypted-DNS censorship study currently being conducted by the Open Observatory Network Interference (OONI).

Article tags:

17 Likes are disabled for this article.
2
Journeying into XDP: Part 0

Journeying into XDP Part 2: XDPerimenting with DNS Telemetry

Author image
Luuk Hendriks

16 min read

In this instalment of our Journeying into XDP series, we look into a passive BPF-program that enables us to plot graphs of DNS metrics without altering the DNS packets or touching the DNS software itself.

Article tags:

21 Likes are disabled for this article.
0
MaxPixel.net-Tree-Icon-Symbol-Technology-Green-Circuit-6742648

Computing Within Limits 2022 Event Wrap

Author image
Vesna Manojlovic

7 min read

Environmental sustainability is a hugely worrisome topic for the Internet industry - and as a Community Builder for the RIPE community, I find it important to engage with the academics and activists who both share our concerns and can contribute in our governance processes. Here is a look back to t…

Article tags:

20 Likes are disabled for this article.
1
iStock-1160031067

Where Did My Packet Go? Measuring the Impact of RPKI ROV

Author image
Koen van Hove

9 min read

Merely doing RPKI ROV does not provide any guarantees where your packet ends up. We conducted an experiment where we look into the impact of RPKI ROV on whether the packet ends up in the intended location based on active beaconing with two servers.

Article tags:

77 Likes are disabled for this article.
1
attack_mark

Stalloris: RPKI Downgrade Attack

Author image
Haya Schulmann

6 min read

Our research considers the impact of malicious publication points on the resilience of RPKI. We explored attacks that target the functionality of the relying party implementations and evaluated the resulting impact on the RPKI validation. We found all the relying party implementations to be vulnera…

Article tags:

24 Likes are disabled for this article.
0

Showing 219 article(s)

Previous
1 ... 6 7 8 9 10 ... 22
Next