Amazon reports cloud outage at North Virginia data center; CME, Coinbase face trading issues

https://fed.brid.gy/r/https://www.rappler.com/technology/amazon-web-services-cloud-outage-north-virginia-data-center/

BGP, the protocol that decides where internet traffic flows, still operates largely on trust. That creates opportunities for route leaks, hijacks, and outages that don’t require touching the target environment at all. https://technicalciso.com/bgp-blind-spots-part-1/ #CyberSecurity #NetworkSecurity #BGP #InternetInfrastructure #SecurityEngineering #CyberRisk
BGP Blind Spots - Part 1

Why compromise a network when you can reroute its traffic?

technicalCISO

DNS Is the First Gate: Why “Safer DNS” Misses the Point

By Cliff Potts, CSO, and Editor-in-Chief of WPS News

Baybay City, Leyte, Philippines — April 14, 2026

Start Simple: What DNS Is Supposed to Do

When a user types a web address, the Domain Name System (DNS) translates that name into a numerical address so the connection can happen. That is its intended role: translation, not judgment (Mockapetris, 1987).

DNS was designed to function as a neutral directory. It does not decide what content is acceptable. It does not evaluate intent. It simply answers the question: “Where is this located?” (Mockapetris, 1987; Cloudflare, n.d.).

That neutrality matters, because DNS happens before anything else. If DNS does not resolve a name, the connection never begins.

Where the Shift Happens

In practice, DNS no longer always behaves as a neutral directory.

Modern DNS services can:

  • Block domains
  • Redirect users
  • Filter categories of content
  • Apply policy decisions at the resolution stage (Cisco, n.d.)

At that point, DNS is no longer just translating. It is deciding.

The system shifts from:

  • “Here is where it is”

to:

  • “Here is what you are allowed to reach”

This is not a technical error. It is a structural change.

The First Gate Problem

Because DNS happens before the connection, control at this layer becomes upstream of everything else.

If a domain does not resolve:

  • The site is effectively invisible
  • The user never reaches it
  • No further safeguards or freedoms apply

That makes DNS the first gate in the system.

Not the loudest gate. Not the most visible.

But the earliest one.

And early control is the most efficient form of control.

The “Safer DNS” Argument

A common response to concerns about DNS is to recommend services such as Cisco/OpenDNS.

These services provide:

  • Malware blocking
  • Content filtering
  • Parental controls
  • Network-wide enforcement (Cisco, n.d.)

All of that is accurate.

All of that is useful in specific contexts.

And none of it addresses the issue being raised here.

What Cisco/OpenDNS Actually Does

Cisco/OpenDNS is a centralized DNS resolver that applies policy decisions at the resolution layer (Cisco, n.d.).

It decides:

  • Which domains resolve
  • Which domains do not
  • How categories of content are handled

This is valuable for:

  • Families managing access for children
  • Schools enforcing acceptable use
  • Enterprises reducing risk exposure

But it operates by introducing control at the DNS layer.

Where It Misses the Point

The issue is not whether DNS can be made safer.

The issue is that DNS has become a point where control can be applied at scale.

Recommending a centralized DNS provider does not solve that problem.

It changes who exercises that control.

(See also: DeNardis, 2014)

This is the core misunderstanding.

The discussion is not about choosing a better tool.

It is about recognizing what the tool has become.

Centralization and Chokepoints

When large numbers of users rely on a small number of DNS providers, resolution becomes concentrated.

That concentration creates a chokepoint.

Not necessarily through overt censorship.

But through the ability to:

  • Shape access
  • Apply policy quietly
  • Influence visibility upstream (DeNardis, 2014; Mueller, 2017)

The risk is not hypothetical.

DNS has already been used globally for:

  • Domain blocking
  • Traffic redirection
  • Policy enforcement at the network level (DeNardis, 2014)

The Structural Difference

There are two different approaches to this problem.

One approach says:

  • Choose a trusted authority to filter DNS
  • Improve safety through centralized control

The other approach says:

  • Reduce the amount of control any single authority has
  • Preserve DNS as neutral infrastructure

These approaches are not compatible.

They solve different problems.

Why This Matters

If DNS remains a layer where a small number of actors can decide how names resolve—or whether they resolve at all—then it remains a structural gate.

It does not need to block loudly.

It does not need to announce itself.

It only needs to sit upstream, quietly determining what resolves and what does not.

That is enough.

The Bottom Line

This discussion is not about whether a DNS service is useful.

Many are.

This discussion is about what DNS becomes when control is concentrated at that layer.

You do not solve that problem by selecting a different controller.

You solve it by recognizing that the layer itself has become a point of control.

And deciding whether that is acceptable.

For more social commentary, please see Occupy 2.5 at https://Occupy25.com

If you read this and it matters, help me keep it going: https://www.patreon.com/cw/WPSNews

References

Cisco. (n.d.). OpenDNS home internet security. https://www.opendns.com/home-internet-security/

Cloudflare. (n.d.). What is DNS?. https://www.cloudflare.com/learning/dns/what-is-dns/

DeNardis, L. (2014). The global war for internet governance. Yale University Press.

Mockapetris, P. (1987). Domain names – Concepts and facilities (RFC 1034). Internet Engineering Task Force. https://doi.org/10.17487/RFC1034

Mueller, M. (2017). Will the internet fragment? Sovereignty, globalization and cyberspace. Polity Press.

#censorship #cybersecurity #digitalGovernance #DNS #internetInfrastructure #networkArchitecture #WPSNews
The origins of open source culture - Negative PID

Today, open source spans every continent and underpins most of the world’s online infrastructure. What began as a small academic and hobbyist practice grew

Negative PID

GoDaddy launches DNS identity system for AI agents, LegalZoom signs on

https://fed.brid.gy/r/https://nerds.xyz/2026/04/godaddy-dns-identity-ai-agents/

The origins of open source culture - Negative PID

Today, open source spans every continent and underpins most of the world’s online infrastructure. What began as a small academic and hobbyist practice grew

Negative PID
Converge dominates Ookla® Speedtest Awards

This marks Converge's third consecutive win in the Ookla® Speedtest Awards, upholding their commitment to bring reliable connectivity to the Philippines

RAPPLER
How far can you go with IX Route Servers only?

[Tech Thoughts] Speedtest, DownDetector owner Ookla’s sale to Accenture at a glance

https://fed.brid.gy/r/https://www.rappler.com/technology/features/things-to-know-ziff-davis-sell-ookla-accenture/

Accenture acquired Speedtest owner Ookla for $1.2 billion, creating a potential conflict of interest. The consulting giant now owns the internet performance measurement tool used by regulators and consumers while simultaneously advising the telecom operators that Speedtest evaluates. The acquisition announcement made no mention of maintaining Ookla's independence. #telecom #internetinfrastructure #tech https://www.implicator.ai/accenture-bought-the-internets-referee-the-conflict-writes-itself/
Accenture Bought the Internet's Referee. The Conflict Writes Itself.

Accenture acquires Speedtest and Downdetector owner Ookla for $1.2 billion, raising conflict-of-interest questions for telecom's top consultant.

Implicator.ai