#ietf125 — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #ietf125, aggregated by home.social.
-
After testing chinese payment apps at #IETF125, I discover in Arora's talk at #UndoneCS that there is an indian payment app, Aadhaar Pay https://play.google.com/store/apps/details?id=com.tcs.merchant.cags.boi&hl=ln
-
After testing chinese payment apps at #IETF125, I discover in Arora's talk at #UndoneCS that there is an indian payment app, Aadhaar Pay https://play.google.com/store/apps/details?id=com.tcs.merchant.cags.boi&hl=ln
-
After testing chinese payment apps at #IETF125, I discover in Arora's talk at #UndoneCS that there is an indian payment app, Aadhaar Pay https://play.google.com/store/apps/details?id=com.tcs.merchant.cags.boi&hl=ln
-
After testing chinese payment apps at #IETF125, I discover in Arora's talk at #UndoneCS that there is an indian payment app, Aadhaar Pay https://play.google.com/store/apps/details?id=com.tcs.merchant.cags.boi&hl=ln
-
After testing chinese payment apps at #IETF125, I discover in Arora's talk at #UndoneCS that there is an indian payment app, Aadhaar Pay https://play.google.com/store/apps/details?id=com.tcs.merchant.cags.boi&hl=ln
-
The Internet Last Week
* IETF 125
https://www.ietf.org/meeting/125/
* Cuba power outage effects
https://noc.social/@cloudflareradar/116240190351546459
https://mastodon.social/@IODA/116246041272623316
https://infosec.exchange/@dougmadory/116240466331483809
https://mastodon.social/@netblocks/116240861464667713
* IoT DDoS botnets disrupted
https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks
* Unallocated IP4 /13 announced
https://infosec.exchange/@spamhaus/116250561577999852
https://bgp.he.net/net/102.224.0.0/13
https://stat.ripe.net/widget/routing-history#resource=102.224.0.0/13&starttime=2026-03-15
* CAs must perform DNSSEC validation
https://cabforum.org/2025/06/18/ballot-sc-085v2-require-validation-of-dnssec-when-present-for-caa-and-dcv-lookups/
https://infosec.exchange/@mnordhoff/116240122433847371 -
The Internet Last Week
* IETF 125
https://www.ietf.org/meeting/125/
* Cuba power outage effects
https://noc.social/@cloudflareradar/116240190351546459
https://mastodon.social/@IODA/116246041272623316
https://infosec.exchange/@dougmadory/116240466331483809
https://mastodon.social/@netblocks/116240861464667713
* IoT DDoS botnets disrupted
https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks
* Unallocated IP4 /13 announced
https://infosec.exchange/@spamhaus/116250561577999852
https://bgp.he.net/net/102.224.0.0/13
https://stat.ripe.net/widget/routing-history#resource=102.224.0.0/13&starttime=2026-03-15
* CAs must perform DNSSEC validation
https://cabforum.org/2025/06/18/ballot-sc-085v2-require-validation-of-dnssec-when-present-for-caa-and-dcv-lookups/
https://infosec.exchange/@mnordhoff/116240122433847371 -
The Internet Last Week
* IETF 125
https://www.ietf.org/meeting/125/
* Cuba power outage effects
https://noc.social/@cloudflareradar/116240190351546459
https://mastodon.social/@IODA/116246041272623316
https://infosec.exchange/@dougmadory/116240466331483809
https://mastodon.social/@netblocks/116240861464667713
* IoT DDoS botnets disrupted
https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks
* Unallocated IP4 /13 announced
https://infosec.exchange/@spamhaus/116250561577999852
https://bgp.he.net/net/102.224.0.0/13
https://stat.ripe.net/widget/routing-history#resource=102.224.0.0/13&starttime=2026-03-15
* CAs must perform DNSSEC validation
https://cabforum.org/2025/06/18/ballot-sc-085v2-require-validation-of-dnssec-when-present-for-caa-and-dcv-lookups/
https://infosec.exchange/@mnordhoff/116240122433847371 -
The Internet Last Week
* IETF 125
https://www.ietf.org/meeting/125/
* Cuba power outage effects
https://noc.social/@cloudflareradar/116240190351546459
https://mastodon.social/@IODA/116246041272623316
https://infosec.exchange/@dougmadory/116240466331483809
https://mastodon.social/@netblocks/116240861464667713
* IoT DDoS botnets disrupted
https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks
* Unallocated IP4 /13 announced
https://infosec.exchange/@spamhaus/116250561577999852
https://bgp.he.net/net/102.224.0.0/13
https://stat.ripe.net/widget/routing-history#resource=102.224.0.0/13&starttime=2026-03-15
* CAs must perform DNSSEC validation
https://cabforum.org/2025/06/18/ballot-sc-085v2-require-validation-of-dnssec-when-present-for-caa-and-dcv-lookups/
https://infosec.exchange/@mnordhoff/116240122433847371 -
The Internet Last Week
* IETF 125
https://www.ietf.org/meeting/125/
* Cuba power outage effects
https://noc.social/@cloudflareradar/116240190351546459
https://mastodon.social/@IODA/116246041272623316
https://infosec.exchange/@dougmadory/116240466331483809
https://mastodon.social/@netblocks/116240861464667713
* IoT DDoS botnets disrupted
https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks
* Unallocated IP4 /13 announced
https://infosec.exchange/@spamhaus/116250561577999852
https://bgp.he.net/net/102.224.0.0/13
https://stat.ripe.net/widget/routing-history#resource=102.224.0.0/13&starttime=2026-03-15
* CAs must perform DNSSEC validation
https://cabforum.org/2025/06/18/ballot-sc-085v2-require-validation-of-dnssec-when-present-for-caa-and-dcv-lookups/
https://infosec.exchange/@mnordhoff/116240122433847371 -
#IETF125
For once, there was no cats on the slides: -
#IETF125
For once, there was no cats on the slides: -
#IETF125
For once, there was no cats on the slides: -
#IETF125
For once, there was no cats on the slides: -
#IETF125
For once, there was no cats on the slides: -
Now, a bit of SciFi: securing communications in space (related to working groups like tiptop or dtn).
Prevent the aliens from modifying packets?
Not obvious to do with asynchronous communications (common in space).
-
Now, a bit of SciFi: securing communications in space (related to working groups like tiptop or dtn).
Prevent the aliens from modifying packets?
Not obvious to do with asynchronous communications (common in space).
-
Now, a bit of SciFi: securing communications in space (related to working groups like tiptop or dtn).
Prevent the aliens from modifying packets?
Not obvious to do with asynchronous communications (common in space).
-
Now, a bit of SciFi: securing communications in space (related to working groups like tiptop or dtn).
Prevent the aliens from modifying packets?
Not obvious to do with asynchronous communications (common in space).
-
Now, a bit of SciFi: securing communications in space (related to working groups like tiptop or dtn).
Prevent the aliens from modifying packets?
Not obvious to do with asynchronous communications (common in space).
-
An interesting point is that the chinese challenge is open internationaly. Foreigners are encouraged to apply. (Unlike what Russia did for GOST.)
Apparently (but the speaker refused to answer) the proposal has to be new. Do not submit ML-KEM.
-
An interesting point is that the chinese challenge is open internationaly. Foreigners are encouraged to apply. (Unlike what Russia did for GOST.)
Apparently (but the speaker refused to answer) the proposal has to be new. Do not submit ML-KEM.
-
An interesting point is that the chinese challenge is open internationaly. Foreigners are encouraged to apply. (Unlike what Russia did for GOST.)
Apparently (but the speaker refused to answer) the proposal has to be new. Do not submit ML-KEM.
-
An interesting point is that the chinese challenge is open internationaly. Foreigners are encouraged to apply. (Unlike what Russia did for GOST.)
Apparently (but the speaker refused to answer) the proposal has to be new. Do not submit ML-KEM.
-
An interesting point is that the chinese challenge is open internationaly. Foreigners are encouraged to apply. (Unlike what Russia did for GOST.)
Apparently (but the speaker refused to answer) the proposal has to be new. Do not submit ML-KEM.
-
A talk about the new chinese commercial cryptographic algorithms program at #IETF125 (ping @shaft)
"commercial" as in "no State secrets"Current algorithms are ZUC, SM2, SM3, SM4, SM9... (All of them ISO standards.) https://en.wikipedia.org/wiki/ZUC_stream_cipher https://en.wikipedia.org/wiki/SM9_(cryptography_standard)
Some are in IANA registries (for instance for TLS) See RFC 8998
Now asking for post-quantum alternatives. (Formal announcement one year ago.) https://niccs.org.cn/niccs/index.html You can still submit a poposal!
-
A talk about the new chinese commercial cryptographic algorithms program at #IETF125 (ping @shaft)
"commercial" as in "no State secrets"Current algorithms are ZUC, SM2, SM3, SM4, SM9... (All of them ISO standards.) https://en.wikipedia.org/wiki/ZUC_stream_cipher https://en.wikipedia.org/wiki/SM9_(cryptography_standard)
Some are in IANA registries (for instance for TLS) See RFC 8998
Now asking for post-quantum alternatives. (Formal announcement one year ago.) https://niccs.org.cn/niccs/index.html You can still submit a poposal!
-
A talk about the new chinese commercial cryptographic algorithms program at #IETF125 (ping @shaft)
"commercial" as in "no State secrets"Current algorithms are ZUC, SM2, SM3, SM4, SM9... (All of them ISO standards.) https://en.wikipedia.org/wiki/ZUC_stream_cipher https://en.wikipedia.org/wiki/SM9_(cryptography_standard)
Some are in IANA registries (for instance for TLS) See RFC 8998
Now asking for post-quantum alternatives. (Formal announcement one year ago.) https://niccs.org.cn/niccs/index.html You can still submit a poposal!
-
A talk about the new chinese commercial cryptographic algorithms program at #IETF125 (ping @shaft)
"commercial" as in "no State secrets"Current algorithms are ZUC, SM2, SM3, SM4, SM9... (All of them ISO standards.) https://en.wikipedia.org/wiki/ZUC_stream_cipher https://en.wikipedia.org/wiki/SM9_(cryptography_standard)
Some are in IANA registries (for instance for TLS) See RFC 8998
Now asking for post-quantum alternatives. (Formal announcement one year ago.) https://niccs.org.cn/niccs/index.html You can still submit a poposal!
-
A talk about the new chinese commercial cryptographic algorithms program at #IETF125 (ping @shaft)
"commercial" as in "no State secrets"Current algorithms are ZUC, SM2, SM3, SM4, SM9... (All of them ISO standards.) https://en.wikipedia.org/wiki/ZUC_stream_cipher https://en.wikipedia.org/wiki/SM9_(cryptography_standard)
Some are in IANA registries (for instance for TLS) See RFC 8998
Now asking for post-quantum alternatives. (Formal announcement one year ago.) https://niccs.org.cn/niccs/index.html You can still submit a poposal!
-
Among the funny questions: at what point will ML-DSA and ML-KEM no longer regarded "Post-Quantum Cryptography" but just plain "Cryptography"? Before or after IPv6 world domination?
-
Among the funny questions: at what point will ML-DSA and ML-KEM no longer regarded "Post-Quantum Cryptography" but just plain "Cryptography"? Before or after IPv6 world domination?
-
Among the funny questions: at what point will ML-DSA and ML-KEM no longer regarded "Post-Quantum Cryptography" but just plain "Cryptography"? Before or after IPv6 world domination?
-
Among the funny questions: at what point will ML-DSA and ML-KEM no longer regarded "Post-Quantum Cryptography" but just plain "Cryptography"? Before or after IPv6 world domination?
-
Among the funny questions: at what point will ML-DSA and ML-KEM no longer regarded "Post-Quantum Cryptography" but just plain "Cryptography"? Before or after IPv6 world domination?
-
Now, SAAG meeting (Security Area Open Meeting, basically examining possible future security work).
There are many IETF working groups in the Security Area...
-
Now, SAAG meeting (Security Area Open Meeting, basically examining possible future security work).
There are many IETF working groups in the Security Area...
-
Now, SAAG meeting (Security Area Open Meeting, basically examining possible future security work).
There are many IETF working groups in the Security Area...