Hacker News new | past | comments | ask | show | jobs | submit login

How to ensure that the RPKI[1], which is designed to prevent BGP hijacks[2], can not be abused by trusted parties[3].

[1] http://en.wikipedia.org/wiki/Resource_Public_Key_Infrastruct...

[2] http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belar...

[3] http://ethanheilman.tumblr.com/post/64208098281/on-trusting-...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: