<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Trust on Wirez</title><link>https://wirez.top/tags/trust/</link><description>Recent content in Trust on Wirez</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 31 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://wirez.top/tags/trust/index.xml" rel="self" type="application/rss+xml"/><item><title>BGP hijacking in 2025: When forged docs beat RPKI</title><link>https://wirez.top/posts/bgp-hijacking-in-2025-when-forged-docs-beat-rpki/</link><pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/bgp-hijacking-in-2025-when-forged-docs-beat-rpki/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">In July 2025, attackers bypassed cryptographic safeguards by manipulating a multinational provider through forged documents and social engineering. This incident proves that &lt;strong>BGP route hijacking&lt;/strong> has evolved from a purely technical exploit into a hybrid threat where human deception defeats &lt;strong>RPKI validation&lt;/strong>. While networks obsess over protocol anomalies, adversaries now target the administrative onboarding processes that grant legitimacy to malicious routes.&lt;/p></description></item><item><title>RPKI stops hijacking: Why 43% IPv4 coverage matters</title><link>https://wirez.top/posts/rpki-stops-hijacking-why-43-ipv4-coverage-matters/</link><pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/rpki-stops-hijacking-why-43-ipv4-coverage-matters/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With &lt;a href="https://en.wikipedia.org/wiki/IPv4" target="_blank" rel="noopener noreferrer">IPv4&lt;/a> ROA coverage hitting 43.17% per Kentik data, &lt;strong>RPKI adoption&lt;/strong> is no longer optional for serious network operators.&lt;/p>
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">The upcoming &lt;a href="https://www.arin.net/" target="_blank" rel="noopener noreferrer">ARIN&lt;/a> Deep Dive in Albuquerque highlights that &lt;strong>routing security&lt;/strong> has shifted from theoretical best practice to immediate operational necessity. &lt;a href="https://www.arin.net/resources/manage/rpki/hybrid/" target="_blank" rel="noopener noreferrer">ARIN&amp;#039;s hybrid&lt;/a> While the global PKI market explodes, the real story lies in the sharp divergence between networks that validate BGP announcements and those still vulnerable to hijacking. This article dissects the critical mechanics of &lt;strong>Resource Public Key Infrastructure&lt;/strong>, arguing that understanding the distinction between hosted and delegated models is now a core competency for any engineer managing autonomous systems.&lt;/p></description></item><item><title>RPKI validation stops 820k daily IoT attacks by 2026</title><link>https://wirez.top/posts/rpki-validation-stops-820k-daily-iot-attacks-by-2026/</link><pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/rpki-validation-stops-820k-daily-iot-attacks-by-2026/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With over 820,000 daily IoT attacks projected for early 2026, &lt;strong>RPKI deployment&lt;/strong> is the only viable defense against mass routing hijacks. The central thesis is clear: manual configuration is obsolete, and &lt;strong>cryptographic validation&lt;/strong> via &lt;strong>Route Origin Authorizations&lt;/strong> is now the baseline for operational survival.&lt;/p></description></item></channel></rss>