"The technical mechanism most commonly proposed for age verification is, depending on the specific implementation, either a government-issued identity document uploaded to a third-party verification service, or a biometric check, or a credit card confirmation, all of which require an individual to associate their real identity with their browsing behaviour before their connection is permitted. This is, it should be noted, structurally identical in concept to the white SIM architecture Iran formally institutionalised in July 2025: a system in which your identity, as documented and approved by a central authority, determines what you are permitted to access on the internet and under what conditions."—Keystone Collective @TheKeystoneCollective

The internet kill switch Iran built while the west was busy debating age verification >

https://www.keystone-collective.org/the-internet-kill-switch-iran-built-while-the-west-was-busy-debating-age-verification/

#control_infrastructures #age_verification #parenting #mass_surveillance #statism #identity_layer #BGP #networks #internet #shutdown #big_brother #identity_verification #centralisation #Iran #UK #Online_Safety_Act #USA #EU #KYC #connectivity #surveillance #chat_control #verification #identity_gating #policy #IODA #protecting_children #hypocrisy #packet_filtering #rhetoric #policymakers #kill_switch #technology

The Internet Kill Switch Iran Built While the West Was Busy Debating Age Verification

The most politically significant event of January 8th, 2026, was not broadcast on television, did not trend on social media, and was not reported by wire services for several hours. It was visible, in real time, only to a small number of people staring at network monitoring dashboards, and what

The Keystone Collective
Knowledge Base | Duo Security

Weekend Reads

* Email address obfuscation in 2026
https://spencermortensen.com/articles/email-obfuscation/
* Profile of Kimwolf botnet researcher
https://www.wsj.com/tech/kimwolf-hack-residential-proxy-networks-a712ab59?st=dHJ5oe
* Quantifying AI data center heat impacts
https://arxiv.org/abs/2603.20897
* Characterizing invalid routes via Tunnels
https://arxiv.org/abs/2603.29207
* Detecting anomalous topology, routes, and congestion
https://arxiv.org/abs/2603.25875

#EMail #Kimwolf #AI #RPKI #BGP

Email address obfuscation: What works in 2026?

Successful surgery on my BGP core for AS201379 done.

Got a third edge-router online, reorganized local-preferences and optimizing packet flows for efficiency and cost.

Monitoring with Grafana is perfectly fine. RIPE Atlas measurement looks amazing for central Europe 🙂

Great connectivity for my 2a06:9801:1c::/48

Looking Glass: https://lg.hofstede.it
Peering information: https://hofstede.it/as201379.html

#networking #bgp #ipv6 #freebsd #frr #ripe

In his @ripencc article, Danny Lachos argues that traditional network visibility is no longer enough, because operators need to understand not just where traffic flows, but which applications are actually behind it. By correlating #DNS, #NetFlow, and #BGP data, the approach aims to map traffic to application and #CDN in a scalable way without relying on #DPI:
https://labs.ripe.net/author/danny-lachos/beyond-the-network-view-dns-driven-application-visibility/

#FlowDNS is a reference implementation by Aniss Maghsoudlou:
https://github.com/maganiss/FlowDNS

We're now on the Kansas City Internet Exchange

Come exchange packets with us 🔄

https://www.peeringdb.com/net/37608

#BGP #Networking #Internet

PeeringDB

The Interconnection Database

🌗 BGP協定現在安全了嗎?
➤ 透過 RPKI 認證機制,築起網際網路路由的安全防線
https://isbgpsafeyet.com/
邊界閘道協定(BGP)作為網際網路的「郵政系統」,負責為數據選定最佳路徑,然而其先天設計缺乏安全性,導致全球網路經常面臨幹擾風險。Cloudflare 指出,唯有透過名為 RPKI 的認證體系,纔能有效防堵惡意路由注入。近年來,隨著全球各大電信商與網際網路服務供應商(ISP)如 Verizon、Comcast 與 Sparkle 等陸續加入防護行列,採用 RPKI 源位址驗證(Origin Validation)並過濾無效路由,網際網路的安全基石正在逐步強化。
+ 網路底層架構的演進總是異常緩慢,看到這麼多大型營運商終於開始過濾無效路徑,總算讓人對網際網路的可靠性稍微放心了一些。
+ RPKI 固然重要,但這終究是一個去中心化的挑戰,如果還有大型 ISP 不跟進,整個路由體系的脆弱點依然存在。
#網路安全 #路由安全 #BGP #RPKI
Is BGP safe yet? · Cloudflare

On the Internet, network devices exchange routes via a protocol called BGP (Border Gateway Protocol). Unfortunately, issues with BGP have led to malicious actors being able to hijack and misconfigure devices leading to security problems which have the potential to cause widespread problems. BGP security can be greatly improved by using technologies such as RPKI to sign Internet routes. This page attempts to track the progress of major Internet players (ISPs, transit operators, and content providers) in their progress to adopt RPKI and other technologies.

Unfortunately, my internet provider #PLDT does not implement #BGP safely. Check out https://isbgpsafeyet.com/ to see if your #ISP implements BGP in a safe way or if it leaves the #internet vulnerable to malicious route hijacks.
Is BGP safe yet? · Cloudflare

On the Internet, network devices exchange routes via a protocol called BGP (Border Gateway Protocol). Unfortunately, issues with BGP have led to malicious actors being able to hijack and misconfigure devices leading to security problems which have the potential to cause widespread problems. BGP security can be greatly improved by using technologies such as RPKI to sign Internet routes. This page attempts to track the progress of major Internet players (ISPs, transit operators, and content providers) in their progress to adopt RPKI and other technologies.

🚀 Ah, the noble quest to secure the Internet's mailman! 🌍 #BGP is still as safe as letting toddlers handle your bank transactions. But fear not, because #ISPs will definitely implement #RPKI and save the day...right after they solve world peace and cure aging. 😂
https://isbgpsafeyet.com/ #InternetSecurity #CyberSecurity #Humor #HackerNews #ngated
Is BGP safe yet? · Cloudflare

On the Internet, network devices exchange routes via a protocol called BGP (Border Gateway Protocol). Unfortunately, issues with BGP have led to malicious actors being able to hijack and misconfigure devices leading to security problems which have the potential to cause widespread problems. BGP security can be greatly improved by using technologies such as RPKI to sign Internet routes. This page attempts to track the progress of major Internet players (ISPs, transit operators, and content providers) in their progress to adopt RPKI and other technologies.

Is BGP safe yet? · Cloudflare

On the Internet, network devices exchange routes via a protocol called BGP (Border Gateway Protocol). Unfortunately, issues with BGP have led to malicious actors being able to hijack and misconfigure devices leading to security problems which have the potential to cause widespread problems. BGP security can be greatly improved by using technologies such as RPKI to sign Internet routes. This page attempts to track the progress of major Internet players (ISPs, transit operators, and content providers) in their progress to adopt RPKI and other technologies.