It's about finding the right service for the right location.
Online trust and the fundamental need to collaborate to address its challenges is an issue I care about deeply. Today I’m excited to share some important news about a new Initiative at the Internet Society that we believe will help us get to the next level in addressing online trust.
The Online Trust Alliance (OTA) is an organisation with objectives very dear to ISOC’s heart. OTA’s mission is to enhance online trust, and its goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users' security, privacy and identity. OTA has a history of being principled, pragmatic and actionable.
European OVH plans to become a disruptive force in the public cloud.
AT&T is the first telco to use programmable switches from Barefoot in its network.
The post On the ‘net: CAP and SDN appeared first on 'net work.
It alerts developers if there are problems with an app.
The use of TLS interception by outbound proxy servers is causing serious problems in updating the TLS standard to Version 1.3.
At the same time, middlebox and antivirus products increasingly intercept (i.e., terminate and re-initiate) HTTPS connections in an attempt to detect and block malicious content that uses the protocol to avoid inspection . Previous work has found that some specific HTTPS interception products dramatically reduce connection security ; however, the broader security impact of such interception remains unclear. In this paper, we conduct the first comprehensive study of HTTPS interception in the wild, quantifying both its prevalence in traffic to major services and its effects on real-world security.
This is the same problem that middleboxes cause anywhere on the Internet – Firewalls, NAT gateways, Inspection, QOS, DPI. Because these complex devices are rarely updated and hard to maintain, they create failures in new protocols. IPv6 rollout has been slowed by difficult upgrades. The same problem is happening with TLS. Its undesirable to fall back to insecure TLS standards that “work” but are insecure.
The business need for proxy servers or protocol interception is for a small range of activities