Competitions
Article lead image

The RIPE Labs Article Competition - RIPE 85

Competition closed

Banner image
security

Is It Possible for Encryption to Harm Cybersecurity?

Author image
Andrew Campling

10 min read

This article provides an update on developments in encrypted DNS and related protocols and their potential impact on cybersecurity. In particular, it highlights how applications are making it increasingly difficult for both enterprises and consumers to monitor their in-bound and out-bound communica…

Article tags:

29 Likes are disabled for this article.
0
Photo by Valeria Fursa on Unsplash

PeeringDB 2022 User Survey

Author image
Leo Vegoda

2 min read

PeeringDB wants input from everyone who uses our interconnection database. Our anonymous survey is now open until 23:59 UTC on 16 October 2022. We would like your feedback to help us make PeeringDB more useful to everyone involved in connecting networks.

Article tags:

9 Likes are disabled for this article.
0
button

Push the Button: SIDN Lab's DDoS Testbed in Action at CONCORDIA Open Door 2022

Author image
Thijs van den Hout

7 min read

Over the past months, SIDN Labs have been improving the testbed they developed for the DDoS Clearing House. At the CONCORDIA Open Door event (COD2022) this October, they'll demonstrate how the testbed works as part of the CONCORDIA Threat Intelligence Platform. The team look at the latest changes t…

Article tags:

26 Likes are disabled for this article.
0
elephant_ball

The Elephant Effect - Considerations on Live Streaming Italy's Serie A Championship

Author image
Flavio Luciani

11 min read

For the first time in Italy, a major event - the Serie A football championship - is being broadcast exclusively via the Internet. In this article, we share some considerations the phenomenon of streaming football in Italy, looking at things from the operator’s point of view

Article tags:

63 Likes are disabled for this article.
1
ooni

Measuring Encrypted-DNS Censorship Using OONI Probe

Author image
Simone Basso

13 min read

In this article we talk through the preliminary results of an encrypted-DNS censorship study currently being conducted by the Open Observatory Network Interference (OONI).

Article tags:

17 Likes are disabled for this article.
2
iStock-1160031067

Where Did My Packet Go? Measuring the Impact of RPKI ROV

Author image
Koen van Hove

9 min read

Merely doing RPKI ROV does not provide any guarantees where your packet ends up. We conducted an experiment where we look into the impact of RPKI ROV on whether the packet ends up in the intended location based on active beaconing with two servers.

Article tags:

77 Likes are disabled for this article.
1
digital_chain

Security by Diversity: Designing Secure, Reliable and Robust Systems

Author image
Fredrik Lindeberg

9 min read

A chain is not as strong as its weakest link, it can be much much stronger. In cybersecurity, the art of building secure systems from insecure but diverse components is an important but often neglected topic. Instead, processes, rigidity and structure are generally seen as the only way to attain se…

Article tags:

143 Likes are disabled for this article.
0