Skip to content
rule 11 reader
  • about
    • about me
    • linkedin
    • rss feeds
    • goodreads
    • feedly
    • amazon
    • travel pictures
    • dispatches from ziklag
  • the hedge
  • reading
    • books
    • papers
    • worth reading
  • archive
  • history
  • network icons

Worth Reading 060925


The story of computing and communications over the past eighty years has been a story of quite astounding improvements in the capability, cost and efficiency of computers and communications.


In recent discussions, it became clear that additional information could be helpful, breaking down what a user or administrator needs to understand about TLS implementation and configuration options to better assess points of potential exposure.


The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space.


We’ve all had the serendipity experience, even online — clicking through a chain of links, scanning Google search results, drifting between loosely connected ideas. But search engines and information retrieval systems aren’t designed to enhance serendipity.


Here I want to look at just one day of the operation of the Internet’s BGP network by looking at the behaviour of a single BGP session. The day we’ll use for this study is the 8h May 2025, and the BGP vantage point used here is an unremarkable network at the edge of the network, AS 131072.

Related

Posted in WORTH READING
← Hedge 270: Password PsychologyWorth Reading 061025 →
© 2025 rule 11 reader | Powered by Beaver Builder
Scroll To Top