Info! Please note that this translation has been provided at best effort, for your convenience. The English page remains the official version.

RFC 9518: Centralization, Decentralization, and Internet Standards has been published after more than two years of review, discussion, and revision. It covers what centralization is, how it can be both beneficial and harmful, the decentralization strategies we typically use to control it, and finally, what Internet standards bodies can do about it. It’s no secret that most people have been increasingly concerned about Internet centralization over the last decade.

We have now broken down that purpose into more specific outcomes to guide our efforts.

Firstly, we want to gain a better understanding of what a single, global RPKI system would look like. We would like to know more about the expectations from the community in terms of consistency across the Regional Internet Registries (RIRs) in their RPKI implementations.

With new and emerging technologies, cyber-attacks are becoming more sophisticated and are increasing. Information about cyber threats, also known as threat intelligence, is a significant defence component, as it contains context, indicators of compromise (IoCs), implications and advised actions regarding identified and emerging possible threats. However, the application of threat intelligence requires that good-quality data be shared by organisations and states.

Observations on African Cybersecurity Landscape Authored by: Emilia Cebrat-Maslowski Introduction Africa’s rapid growth in Internet communications is creating a wide range of opportunities but also a wide range of vulnerabilities. This rapid shift to online activities has created a goldmine for cyber criminals.

Experimental IPv6-only network at APRICOT 2024 APRICOT is the Internet Network Operators Summit for the Asia Pacific region. Every year, a conference wireless network is built to provide connectivity for hundreds of delegates, with a separate "IPv6-only" SSID as an alternative for people to try. This year, we decided to experiment with a new approach, by using some of the recent mechanisms designed for "IPv6-mostly" networks to build a better "IPv6-only" network. What's IPv6-mostly?

Introduction In the intricate tapestry of the digital world, where data flows ceaselessly across networks, ensuring the integrity and security of Internet routing is paramount. Yet, the Border Gateway Protocol (BGP), the backbone of Internet routing, has long been confronted with vulnerabilities that expose it to manipulation and hijacking. Here comes the Resource Public Key Infrastructure (RPKI) – a cryptographic framework designed to fortify BGP and safeguard Internet routing against malicious actors.

Page 1 of 30