Blog
-
Double-Edged Sword: How Attackers Use the Same Cloud Infrastructure We Rely On
Malicious actors are increasingly favoring partial use of cloud services rather than fully migrating their infrastructure.
Categories: -
A Decade-long Landscape of Advanced Persistent Threats
Between 2014 and 2023, 154 countries experienced an Advanced Persistent Threat (APT) attack.
Categories: -
BGP Vortex: Internet Routing Vortices Create Outages by Preventing Convergence
A BGP Vortex exploits widely used routing policies to trigger persistent oscillations between major Internet networks that can lead to Internet outages.
Categories: -
Rethinking Geolocation on the Internet
Researchers have proposed a new approach that relies on a trusted third-party authority to verify and attest both a user's location and the accuracy requirements declared by the service.
Categories: -
Characterizing Internet Centralization vs Regionalization
Geopolitical, historical, and linguistic factors shape which companies and countries are relied upon for web infrastructure.
Categories: -
Exploring the Potential of RPKI Signed Checklists: The Results Are In
The Internet Society recently explored the feasibility of RSCs to strengthen the resilience and trustworthiness of the Internet's routing system.
Categories: -
Comparing Batch and Streaming Detection of Internet Outages
Using both batch and streaming Internet detection methods can improve visibility of Internet outages.
Categories: -
Are Research and Education Networks Critical Infrastructure?
Research and Education (R&E) networks are foundational cornerstones of today's Internet.
Categories: -
VPN or Vpwn: How Afraid Should You Be of VPN Traffic Identification?
A recent study finds that popular VPN protocols can be easily identified and blocked by ISPs.
Categories: -
How Much Mobile Competition Is Just Right?
A new game-theoretic model shows that consumer benefits peak at a sweet spot in the number of firms that depends on market size, spectrum, investment efficiency, and user usage.
Categories: -
Measuring “Under-Connectedness” Reveals More About Lived Experiences of Digital Inequality
Under-connected families have access to the Internet; they just can’t rely on having it when needed.
Categories: -
On the Constancy of Latency at the Internet’s Edge
New study characterizes the stability of latency between end users and content delivery network (CDN) edge servers, which are critical infrastructure for delivering content to most Internet users.
Categories:












