Heavy Networking 643: Privacy Responsibilities Of Running A Network
What does privacy have to do with running a network? Is protecting the privacy of users, customers, and the organization one of the responsibilities of the networking team? If so, what kind of...
View ArticlePrivacy and Networking Part 6: Essential Questions For Privacy Best Practices
Thus far, I’ve concluded that IP addresses and other information network operators handle is personally identifiable (PII) and covered under privacy and security regulations. I’ve also looked at the...
View ArticlePrivacy And Networking Part 7: DNS Queries And Having A Breach Plan
In the final post in this privacy series, Russ White looks at privacy information that can be gleaned from DNS queries, and outlines essential steps in developing your breach plan. Don't have a breach...
View ArticleIPv6 Buzz 114: Another Listener Questions Episode!
Today's IPv6 Buzz episode answers listener questions about Duplicate Address Detection (DAD) and auto-addressing, privacy and IPv6, and where NAT46 fits in. The post IPv6 Buzz 114: Another Listener...
View ArticlePrivacy And Networking Part 8: IPv6 Addresses And Privacy
One of the biggest advantages of IPv6 is the ease of renumbering thanks to SLAAC and DHCPv6. Easy renumbering of IPv6 addresses should, in theory, make some privacy protection methods easy to...
View ArticleNetwork Break 432: DriveNets Aims To Make Ethernet AI-Friendly; China Goes...
This week we discuss a new offering from DriveNets that aims to make Ethernet more suitable as a network fabric for AI workloads, why the EU slapped Meta with a $1.3 billion fine, and a new offering...
View ArticleCan We Trust Worldcoin’s Aspirin For AI Headaches?
This post originally appeared in the Packet Pushers’ Human Infrastructure newsletter, a weekly mailing of essays, links to technical blogs and IT news, and whatever else think is interesting. Subscribe...
View ArticleCisco’s Personal Insights: Good Intentions On The Road To Hell
New behavioral monitoring capabilities in Cisco Webex are being positioned as insights to improve employee well being and work-life integration, but adding layers of surveillance isn't the way to...
View ArticlePrivacy And Networking: Part 1 – Why Privacy?
In the first post on a series on privacy and networking, Russ White makes the case that privacy matters not just for infosec, risk management, or compliance, but as a human right.
View ArticlePrivacy And Networking Part 2: Legal And Ethical Privacy
Given the arguments from the first article in this series, if privacy should be and is essential—what does the average network engineer do with this information? How does privacy impact network design...
View ArticlePrivacy And Networking Part 3: Is An IP Address Protected Information For...
Does an IP address need to be treated like other Personally Indentifiable Information (PII)?
View ArticleImproving DNS Privacy With QNAME Minimization (RFC7816)
This post originally appeared on the Packet Pushers’ Ignition site on October 1, 2019. When a host doesn’t know the IP address for a hostname, what does it do? It asks its configured DNS server to...
View ArticlePrivacy And Networking Part 4: Logging
In the last post on this topic, I concluded that IP addresses are protected information—operators should handle users’ IP addresses according to privacy best practices. But I also concluded that...
View ArticlePrivacy And Networking Part 5: The Data Lifecycle
In the previous posts in this series, I concluded that privacy is everyone’s responsibility, that IP addresses (and a lot of other information network engineers handle) are protected information, and...
View ArticlePrivacy and Networking Part 6: Essential Questions For Privacy Best Practices
Thus far, I’ve concluded that IP addresses and other information network operators handle is personally identifiable (PII) and covered under privacy and security regulations. I’ve also looked at the...
View ArticlePrivacy And Networking Part 7: DNS Queries And Having A Breach Plan
In the final post in this privacy series, Russ White looks at privacy information that can be gleaned from DNS queries, and outlines essential steps in developing your breach plan. Don't have a breach...
View ArticlePrivacy And Networking Part 8: IPv6 Addresses And Privacy
One of the biggest advantages of IPv6 is the ease of renumbering thanks to SLAAC and DHCPv6. Easy renumbering of IPv6 addresses should, in theory, make some privacy protection methods easy to...
View Article