<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Records on Wirez</title><link>https://wirez.top/tags/records/</link><description>Recent content in Records on Wirez</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 28 Apr 2026 17:13:45 +0000</lastBuildDate><atom:link href="https://wirez.top/tags/records/index.xml" rel="self" type="application/rss+xml"/><item><title>Serverless key-value stores use DNS TXT data</title><link>https://wirez.top/posts/serverless-key-value-stores-use-dns-txt-data/</link><pubDate>Tue, 28 Apr 2026 17:13:45 +0000</pubDate><guid>https://wirez.top/posts/serverless-key-value-stores-use-dns-txt-data/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Storing 670,000 TXT records to serve a single gigabyte proves &lt;a href="https://en.wikipedia.org/wiki/Domain_Name_System" target="_blank" rel="noopener noreferrer">DNS&lt;/a> functions as a viable, if absurd, serverless key-value store. You will learn how to architect this &lt;strong>serverless key-value&lt;/strong> abuse, implement file reassembly from fragmented text chunks, and execute binary patching entirely within.&lt;/p></description></item><item><title>Manual key rollovers fail; try CDS records now</title><link>https://wirez.top/posts/manual-key-rollovers-fail-try-cds-records-now/</link><pubDate>Wed, 25 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/manual-key-rollovers-fail-try-cds-records-now/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Only 4.27% of 240.3 million domains are &lt;a href="https://datatracker.ietf.org/doc/html/rfc4033" target="_blank" rel="noopener noreferrer">DNSSEC&lt;/a>-signed, proving that manual key management has failed the internet for two decades. Despite twenty years of existence since the protocol&amp;#039;s 2005 rollout, secure delegation rates stagnated at just 7% in 2025, according to industry analysis. Barbara Jantzen and Peter Thomassen highlight that while validation rates hit 36%, the gap remains due to &amp;quot;overly complex implementations&amp;quot; and error-prone maintenance cycles. The cost of this inertia is stark: global cybercrime costs are projected to reach $10.8 trillion in 2026, fueled by unmitigated threats like DNS spoofing that &lt;strong>secure delegation&lt;/strong> specifically prevents. Current first-quarter 2026 data shows only 8.11% of queries resolve to signed domains, indicating that voluntary adoption has hit a ceiling imposed by usability barriers.&lt;/p></description></item><item><title>ARIN 57 policy dates set for April</title><link>https://wirez.top/posts/arin-57-policy-dates-set-for-april/</link><pubDate>Wed, 21 Jan 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/arin-57-policy-dates-set-for-april/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With 40,000 organizations relying on &lt;a href="https://www.arin.net/" target="_blank" rel="noopener noreferrer">ARIN&lt;/a>&amp;#039;s management of 8 million records, the stakes for &lt;strong>internet resource governance&lt;/strong> have never been higher. &lt;a href="https://www.arin.net/announcements/20250512/" target="_blank" rel="noopener noreferrer">ARIN research data&lt;/a> The upcoming &lt;strong>ARIN 57 Public Policy and Members Meeting&lt;/strong> serves as the critical nexus where community consensus directly shapes the technical backbone of the North American internet. This is not merely a procedural gathering; it is the engine room for &lt;strong>routing security&lt;/strong> and &lt;strong>IP address allocation&lt;/strong> in an era of escalating digital reliance.&lt;/p></description></item><item><title>Predictive routing intelligence stops BGP outages early</title><link>https://wirez.top/posts/predictive-routing-intelligence-stops-bgp-outages-early/</link><pubDate>Thu, 01 Jan 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/predictive-routing-intelligence-stops-bgp-outages-early/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Only 38% of RADB records matched &lt;a href="https://datatracker.ietf.org/doc/html/rfc6480" target="_blank" rel="noopener noreferrer">RPKI&lt;/a> data in 2021, proving that reactive monitoring leaves the majority of routing infrastructure exposed to preventable hijacks. The &lt;strong>BGP Security Intelligence Platform&lt;/strong> fundamentally shifts operations from passive alerting to &lt;strong>predictive routing-risk intelligence&lt;/strong> by analyzing origin-side vulnerabilities before they trigger outages. This architecture moves beyond simple route change notifications to anticipate where malformed announcements will propagate based on structural weaknesses.&lt;/p></description></item></channel></rss>