February 21, 2022 1:59PM
The quantum solace and spectre
What is quantum computing and what advances have been made so far on this front? In this blog post, we will answer this question and see how to protect against quantum adversaries...
November 08, 2021 3:39PM
Sizing Up Post-Quantum Signatures
How much room does TLS have for the big post-quantum signatures? We had a look: it’s tight....
October 15, 2021 2:02PM
“Look, Ma, no probes!” — Characterizing CDNs’ latencies with passive measurement
Speed & Reliability
A challenge with measuring and comparing network performance is the lack of large-scale global performance metrics, like RTT measurements. In this article we describe an alternative approach to active measurements, which accurately predicts network latencies using only passively collected data....
October 15, 2021 2:01PM
Multi-User IP Address Detection
We’ve devised novel methods to detect multi-user IP addresses, and today we’re excited to announce their integration into our global threat intelligence products. These will improve the quality of our detection techniques and reduce false positives for our customers, and the clients that visit them....
October 15, 2021 2:00PM
Geo Key Manager: Setting up a service for scale
Geo Key Manager
Diagnosing scaling issues in a service associated with TLS termination through a deep dive into some of the incidents it caused....
October 14, 2021 1:59PM
Privacy-Preserving Compromised Credential Checking
Announcing a public demo and open-sourced implementation of a privacy-preserving compromised credential checking service...