<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Secure on Wirez</title><link>https://wirez.top/tags/secure/</link><description>Recent content in Secure on Wirez</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 17 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://wirez.top/tags/secure/index.xml" rel="self" type="application/rss+xml"/><item><title>SCION routing fixes BGP's 40-year security gap</title><link>https://wirez.top/posts/scion-routing-fixes-bgps-40-year-security-gap/</link><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/scion-routing-fixes-bgps-40-year-security-gap/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Over 7,000 route entries remained invalid in March 2020 despite decades of patch attempts. The Border Gateway Protocol fundamentally lacks native mechanisms to verify address ownership, rendering current fixes like RPKI insufficient against sophisticated &lt;strong>route hijacks&lt;/strong>. While extensions such as &lt;strong>BGPsec&lt;/strong> attempt to secure the AS_PATH attribute, they impose heavy computational overhead and fail to address the core architectural rot of a forty-year-old system.&lt;/p></description></item><item><title>Manual key rollovers fail; try CDS records now</title><link>https://wirez.top/posts/manual-key-rollovers-fail-try-cds-records-now/</link><pubDate>Wed, 25 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/manual-key-rollovers-fail-try-cds-records-now/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Only 4.27% of 240.3 million domains are &lt;a href="https://datatracker.ietf.org/doc/html/rfc4033" target="_blank" rel="noopener noreferrer">DNSSEC&lt;/a>-signed, proving that manual key management has failed the internet for two decades. Despite twenty years of existence since the protocol&amp;#039;s 2005 rollout, secure delegation rates stagnated at just 7% in 2025, according to industry analysis. Barbara Jantzen and Peter Thomassen highlight that while validation rates hit 36%, the gap remains due to &amp;quot;overly complex implementations&amp;quot; and error-prone maintenance cycles. The cost of this inertia is stark: global cybercrime costs are projected to reach $10.8 trillion in 2026, fueled by unmitigated threats like DNS spoofing that &lt;strong>secure delegation&lt;/strong> specifically prevents. Current first-quarter 2026 data shows only 8.11% of queries resolve to signed domains, indicating that voluntary adoption has hit a ceiling imposed by usability barriers.&lt;/p></description></item></channel></rss>