The recent use of DNS hijacking by Malaysian authorities to block certain content reveals a dangerous precedent for Internet regulation in Malaysia.
Most ccTLDs have redundancy in place but not across all critical metrics, particularly multiple TLDs and Anycast for IPv6.
A new study shows that half of the top 10 most popular VPNs used today are vulnerable to having their routes intercepted by an attacker.
DNS usage patterns are sometimes influenced by external factors like censorship or surveillance. Understanding these patterns can give important insights into the local Internet landscape.
Newly proposed funding from the World Bank funding comes at a critical point in Zambia’s Internet development and will allow it to expand on some critical foundational components it has already established.
It is no longer sufficient to consider broadband access alone when considering the digital divide.
Internet trust relationships follow the same pattern as traditional trade and trust and are subject to explicit or implicit risk evaluation.
What impact is Kenya’s growing number of power outages having on its Internet resilience?