Worth Reading: What Can the DNS Tell Us About the Effect of Working From Home on the Internet?

A similar story was evident using a study of DNS resolver patterns by InternetNZ’s Sebastián Castro at the recent DNS OARC 32a workshop. The lockdown in New Zealand saw increased DNS activity, and various events, such as daily broadcasts on the state of the pandemic, could be mapped to DNS traffic activity. —João Luis Silva Damas

Worth Reading: What Will Cybersecurity’s ‘New Normal’ Look Like?

The big question for us, though, is what will the new normal be for those in cybersecurity? —Curtis Franklin

Worth Reading: Exploiting Speculative Execution

Spectre attacks involve inducing a victim to speculatively perform operations that would not occur during correct program execution and which leak the victim’s confidential information via a side channel to the adversary. —ACM

Worth Reading: 8 Lessons from 20 Years of Hype Cycles

As a VC at Icon Ventures and a twenty year veteran of productizing and marketing high tech for VMware, Netscape and others, I’ve always been fascinated by how new technologies emerge and come to market. —Michael Mullany

Worth Reading: Where is the DNS Headed?

The question I found myself asking was: “What has DNS privacy to do with registration operations?” The registration function is part of the process of public attestation relating to some form of title of exclusive control. —Geoff Huston

Worth Reading: The real network challenge is capability – not capacity.

Over the years, the capacity of our fixed network connections has grown exponentially – from a typical 4K dial-up modem at the dawn of the Internet era, through basic broadband and xDSL connections, to a world where 1GB fibre to the premises (FTTP) connections are becoming commonplace. That is a remarkable growth in connection capacity. —Sigal Biran-Nagar

Worth Reading: What is Network Time Security and Why is it Important?

Unfortunately, NTP is vulnerable to Man-in-the-Middle (MITM) attacks. This is where a malicious actor sits between you and the NTP server, and listens in on the conversation, forges messages and lies to you about time. —Michael Cardell Widerkrantz

Worth Reading: Technology Adoption in the Internet

How are new technologies adopted in the Internet? What drives adoption? What impedes adoption? These were the questions posed at a panel session at the recent EuroDiG workshop in June. —Geoff Huston

Worth Reading: Why should I run my own DNS resolver?

One of the most common questions I hear from small and even medium-sized ISPs is ‘Why should I run my own DNS resolver(s)? —Nick Buraglio

Worth Reading: IoT Security Is a Mess

Given that IoT security seems unlikely to magically improve anytime soon, researchers and regulators are rallying behind a new approach to managing IoT risk. Think of it as nutrition labels for embedded devices. —Lily Hay Newman