Version 6 of the Internet Protocol
POPULARITY
Categories
Max and Q cover the latest happenings in the world of Bitcoin, privacy and much more. AOBMissing FTFNode woesPrimeNEWSPayJoin foundation gets 501c3 statusDutch Parliament explainer on Unrealized Cap GainsPersona age verificationLightning network volumeFutureBit launches Apollo 3BIP360 announcedBoltz closes Telegram groupUPDATES/RELEASESIbis Wallet v2.1-beta ⭐A self-custody Bitcoin wallet for Android, inspired by Sparrow Wallet but built for mobile.Designed for experienced users - no hand-holding, no training wheels.v2.1-betaLink: https://github.com/aeonBTC/IbisWallet/releases/tag/v2.1-betaSparrow Wallet — 2.4.0 (10 Feb) + 2.4.1 (17 Feb) ⭐v2.4.0: BIP375 PSBT fields for silent payments hardware wallet support, PSBTv2 as default format, Codex32 seed importer, new device support (Trezor Safe 7, Keycard, Ledger Nano Gen5), wallet discovery featurev2.4.1: KeepKey passphrase support, Samourai wallet backup import fix, address chunking layout fixesLink: https://github.com/sparrowwallet/sparrow/releases/tag/2.4.1Envoy — 2.2.5 (10 Feb) + 2.2.6 (16 Feb) ⭐v2.2.5: Heavy focus on Passport Prime onboarding and device management, improved Tor reliability for supply chain verification, better error messaging, Bluetooth protocol bumpv2.2.6: Updated Envoy Server Tor endpointLink: https://github.com/Foundation-Devices/envoy/releases/tag/2.2.6Aqua Wallet — v0.4.0 (10 Feb)Full UI/UX redesign, multi-wallet support (works with BTCPay Server's SamRock Protocol), Bitcoin price chart, Satspace Standard for BTC amounts, colour-coded address numerals, 7 new languagesLink: https://github.com/AquaWallet/aqua-wallet/releases/tag/v0.4.0BTCPay Server — v2.3.5 (17 Feb)Can now start without on-chain payment methods (BTCPAY_NODEFAULTCHAIN), custom checkout textbox, CoinDCX rate provider for BTC/INRLink: https://github.com/btcpayserver/btcpayserver/releases/tag/v2.3.5Bisq — v2.1.9 (8 Feb)50+ language support, automatic backup restoration for corrupted storage, pairing for Bisq Connect, reference time checks for clock syncLink: https://github.com/bisq-network/bisq2/releases/tag/v2.1.9Cake Wallet — v5.9.0 (11 Feb)BNB Smart Chain (BSC) support, Zcash shielded transaction refinements, enhanced EVM engineLink: https://github.com/cake-tech/cake_wallet/releases/tag/v5.9.0Frostsnap — v0.2.1 (23 Feb)QR camera scanning now works on ALL platforms (Linux, macOS desktop — was Android only), IPv6 connectivity fix using Happy Eyeballs algorithm, macOS notarisationLink: https://github.com/frostsnap/frostsnap/releases/tag/v0.2.1Mostro — v0.16.3 (20 Feb)Docker image + settings template for StartOS integration, fixed privacy bug preventing buyer invoice leaking to sellersLink: https://github.com/MostroP2P/mostro/releases/tag/v0.16.3Peach Bitcoin — 0.69.0 (9 Feb + 16 Feb)Bug fixes for escrow funding, improved offer cards, trade request instructions, removal of forbidden currencies/payment methodsLink: https://github.com/Peach2Peach/peach-app/releases/tag/v0.69.0(329)Umbrel — 1.6.1 (11 Feb)umbrelOS 1.6.1 release (minimal release notes)Link: https://github.com/getumbrel/umbrel/releases/tag/1.6.1LNBits — v1.5.0-rc2 (20 Feb, pre-release)Release candidate. Stable v1.4.2 (3 Feb, grace period) was a websocket hotfixLink: https://github.com/lnbits/lnbits/releases/tag/v1.5.0-rc2Chat Extension Showcase: https://x.com/arcbtc/status/2022424587083096458Mempool — v3.3.0-beta (21 Feb, pre-release)Beta release for testingLink: https://github.com/mempool/mempool/releases/tag/v3.3.0-betaZeus — v0.12.4-beta1 (10 Feb, beta)Android SQLite sync fix, Neutrino data deletion, wallet list visibility fixLink: https://github.com/ZeusLN/zeus/releases/tag/v0.12.4-beta1BULL Bitcoin — v6.5.4-swap-rescue (21 Feb, support-only)Not a public release — rescue build for users with swap status bugs from v6.5.2Link: https://github.com/SatoshiPortal/bullbitcoin-mobile/releases/tag/v6.5.4-swap-rescueEDUCATIONBTC sessions Umbrel home videoBTC sessions BTCPay videoBTC sessions Bull wallet videoShinobi on cluster mempoolWicked Bitcoin BIP-110 fork explainer videoHELP GET SAMOURAI A PARDONSIGN THE PETITION ----> https://www.change.org/p/stand-up-for-freedom-pardon-the-innocent-coders-jailed-for-building-privacy-tools DONATE TO THE FAMILIES ----> https://www.givesendgo.com/billandkeonneSUPPORT ON SOCIAL MEDIA ---> https://billandkeonne.org/VALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.(00:00) INTRO(00:57) THANK YOU FOUNDATION(01:38) THANK YOU CAKE WALLET(02:43) Passport Prime Time(17:45) Payjoin Foundation Becomes 501c3(19:15) Dutchies Go Full Tard(27:18) Persona Age Verification(30:29) Lightning Network According to River(32:34) New Futurebit Apollo Release(36:47) BIP 360 is Announced(38:31) Boltz Closes Telegram(39:09) BOOSTS(44:05) Ibis Wallet(46:11) Sparrow Wallet 2.4.1(47:22) Aqua Wallet Redesign(52:53) Security Camera Session(57:30) THANK YOU MYNYMBOX
Het gebouw verzakt, het contract loopt af, en 160 servers moeten naar een nieuw thuis. Twee datacentra tegelijk verhuizen — met een team van vrijwilligers. Welkom bij ColoClue. Netwerkvereniging ColoClue is een coöperatieve colocatievereniging: een club van zo'n 250 leden die samen serverruimte huren in professionele datacentra en daar hun eigen hardware ophangen. Geen SLA's, geen commerciële dienst — maar wel een eigen netwerk (AS8283), verbindingen met meerdere internet exchanges en een indrukwekkende hoeveelheid veteranen uit de internetbranche. Bestuurslid Tjerk Jan Vonk en medeoprichter Niels Raijer vertellen over de dubbele datacenterverhuizing die deze zomer op het programma staat. Van EU Networks (het pand verzakt) en Cupra naar Iron Mountain in Haarlem en NorthC in Amsterdam. Daarnaast: een nieuw remote rack in Enschede, een partnerschap met AMS-IX via de Bright Networks Club, en Randals zoektocht om twee servers op één colocatieplek te hangen zonder dubbel te betalen. Over Tjerk Jan Vonk Tjerk Jan Vonk is freelance netwerkarchitect en sinds april 2024 bestuurslid bij ColoClue, waar hij de dubbele datacentermigratie leidt. Hij heeft eerder bij Equinix Enschede gewerkt en studeerde aan Saxion Hogeschool. LinkedIn: https://www.linkedin.com/in/tjerk-jan-vonk-6171b638/ Website: https://decramy.nl Over Niels Raijer Niels Raijer is CTO en oprichter van Fusix Networks en medeoprichter van ColoClue. Met 25+ jaar ervaring in IP-networking is hij ook vice-voorzitter van NLNOG en voorzitter van de Route Server Support Foundation. LinkedIn: https://www.linkedin.com/in/niels-raijer-733156/ Website: https://www.fusix.nl In deze aflevering 0:00:00 Een verzakkend datacenter en een aflopend contract — de aanleiding0:05:30 EU Networks sluit de deuren: wat nu met negen racks vol servers?0:09:00 250 leden, 160 servers: de schaal van ColoClue in perspectief0:11:30 Eén of twee datacentra? De ledenbevraging en de beslisboom0:20:00 Iron Mountain en NorthC: hoe kies je een nieuw datacenter?0:25:00 Verrassing: ColoClue opent een remote rack in Enschede0:29:00 ColoClue punches above its weight — professioneler dan het mag zijn0:37:00 Wenspakketje: PDU's, crossconnects en de grote Excel-sheet0:44:30 De verhuisplanning: mei en juli, met busjes vol oud ijzer0:47:00 Harde schijven, RAID-configuraties en de angst voor nevenschade0:55:00 Connectiviteit regelen: Fusics, AMS-IX en de Bright Networks Club1:03:00 IPv4-schaarste, IPv6-dromen en Odido-frustratie1:09:00 Oproep: ColoClue zoekt vrijwilligers voor de netwerkcommissie1:11:00 Randals twee-server-dilemma: ducttape of dubbel betalen? Genoemd in deze aflevering ColoClue — https://coloclue.net Fusix Networks — https://www.fusix.nl AMS-IX / Bright Networks Club NorthC Datacenters Iron Mountain (voorheen InfoSwitch, via Leaseweb) Nikhef Soleus (VPS-vereniging) Immich (open source foto-oplossing) Tips van de tafel Tjerk Jan: Lees je SMART-values uit om harde schijven in de gaten te houden voordat ze stuk gaan. Randal: Gebruik een rotatiebackupschema (dagelijks/wekelijks/maandelijks) én bewaar backups op een andere locatie. Annelies: Druk je favoriete foto's ook fysiek af — digitale backups zijn niet het hele verhaal. See omnystudio.com/listener for privacy information.
Der Titel der heutigen Episode ist: Digitale Kolonie oder Souveränität? Europa steckt in einer Reihe von Herausforderungen, eine davon ist, wie wir die immer durchdringendere Digitalisierung zu unserem Vorteil nutzen und die damit verbundenen Risiken minimieren können. Ich freue mich besonders, für dieses sehr wichtige Thema zwei Gesprächspartner zu haben: Wilfried Jäger und Kevin Mallinger. Wilfried hat in Wien technische Physik studiert und anschließend eine Postdoc-Stelle im Bereich „Industrial Policy” am MIT in den USA angenommen. Danach war er als Berater mit Schwerpunkt IT-Einsatz tätig. Seine Konzernlaufbahn konzentrierte sich auf physische Infrastrukturen, zunächst im Bereich Eisenbahn und später im Rechenzentrumsbetrieb. Diese Tätigkeit hatte er auch in der Verwaltung inne, bis er vor ca. 8 Jahren den Schwerpunkt auf KI in der Verwaltung legte. Seine Interessensschwerpunkte sind digitale Infrastrukturen und Open-Source-Software. Neben der beruflichen Tätigkeit, und dies ist für diese Episode ebenfalls sehr wichtig, hat er vor mehr als 15 Jahren den Verein OSSBIG mitgegründet, der das Thema Unabhängigkeit und Souveränität auf unterschiedlichen Ebenen propagiert. Kevin ist Leiter der Forschungsgruppe Complexity and Resilience und verantwortlich für die anwendungsorientiere Forschung im Forschungszentrum SBA Research in Wien.Er ist im Bereich der Informatik und Komplexitätsforschung mit einem besonderen Schwerpunkt auf nachhaltige Technologien. Außerdem leitet er bei der Österreichischen Computer Gesellschaft die Arbeitsgruppe Informatik und Nachhaltigkeit. Digitale Souveränität ist aktuell in aller Munde, besonders in Europa, aber ist es schlicht ein Buzzword, alter Wein in neuen Schläuchen oder relevant und wichtig? Ich nehme in diesem Podcast von Buzzword-Themen Abstand. Daher ist es aus meiner Beobachtung eine wesentliche Diskussion, die wohl seit mindestens 25 Jahren schwelt, und gerade wieder gehyped wird, dennoch aber von fundamentaler Bedeutung ist. Aber zunächst gehen wir einen Schritt zurück: Viele Zuhörer sind keine Techniker — warum ist Software und digitale Souveränität überhaupt ein Thema? Vor einigen Jahrzehnten war es noch schwer, die gesellschaftliche Bedeutung in der Breite der Gesellschaft klar genug zu machen, auch wenn die technisch/ökonomische schon einigen klar war. So erklärt sich unter anderem auch die Gründung der OSSBIG, von der Wilfried erzählt. Digitalisierung hat nun die gesamte Gesellschaft sehr offensichtlich in jeder alltäglichen Dimension durchdrungen — damit werden auch Abhängigkeiten und Gefahren in der Breite deutlicher. Was ist somit unter der Plattformisierung digitaler Infrastrukturen zu verstehen? Was sind die Folgen? Die gesamte Prozesskette ist ungleich komplexer geworden und damit natürlich auch die Fortpflanzung von Fehlern und Abhängigkeiten ausgeprägter. Hinzu kommt der evolutionäre Aspekt von Technik, das heißt, Neues wird immer auch auf Altem aufgebaut, was neue Herausforderungen mit sich bringt. Diese Situation ist eben keine rein technische mehr, sondern ist zu einer komplexen Gemengelage aus technischen, geopolitischen, militärischen und wirtschaftlichen Themen geworden. Das macht die Sache natürlich nicht einfacher. Wie sehen wir digitale Souveränität und Autonomie? Wer ist souverän, in welcher Hinsicht? Welche Rolle spielen andere Schlagworte in diesem Umfeld, etwa Komplexität, Open Source und Open Protocol, Netzwerkeffekte? Ein Indikator für die Explosion an IT-Services und Diensten und daraus folgender Komplexität: »Wir haben IPV6 eingeführt, weil wir mussten — das hat mehr IP-Adressen als es Atome im Weltall gibt.« Welche Rolle spielen Marktmechanismen in diesem Kontext? Wie werden neue Technologien eingeführt? Was können wir aus der Vergangenheit lernen? »Aus Spaß wird Ernst und aus Ernst wird Infrastruktur.« Technik ist meist ein zweischneidiges Schwert: »Auf der einen Seite gewinnen wir Freiheiten, auf der anderen Seite schaffen wir Abhängigkeiten auf einer anderen, meist systemischen Ebene.« Diese Abhängkeiten, diese Infrastruktur muss heute sogar global betrachtet werden. Single Points of Failure sind nicht mehr theoretisch, sondern immer wieder zu beobachten. »Durch die Komplexität verlieren wir den Überblick.« Abhängigkeiten gehen weit über die IT hinaus und sind teiweise zirkulär. Was bedeutet dies konkret? Software ist zwar ein virtuelles Gut, aber wird dadurch noch schneller weltumspannend wirksam. Wie wirkt Evolution in der Software? innerhalb einer Organisation marktwirtschaftlicher Wettbewerb zwischen Unternehmen Open Source — wir funktioniert Evolution hier? Welche Auswirkungen hat das auf Eigentumsrechte, Verantwortlichkeit, Motivation, Zentralität vs. Dezentralität? Wer hat noch Kontrolle über die Systeme, die entwickelt werden und die sich evolutionär weiterentwickeln? Es kommen wieder die häufig genannten Fragen auf: Wo findet Steuerung und Kontrolle statt und wo soll sie vernünftigerweise stattfinden? Kann man Komplexität überhaupt sinnvoll zentralisieren? »Der Steuerungsmechanismus kann nicht weniger komplex sein als das System selber.« Kehren wir also wieder zu den frühen kybernetischen Erkenntnissen und Problemen zurück? Das wurde von W. Ross Ashby (und Stafford Beer) als Law of Requisite Variety bezeichnet. Was ist Edge Computing? Wie können verteilte Ansätze hier weiterhelfen? Aber wie schafft man die Abwägung zwischen größeren strategischen Überlegungen und operativen taktischen Entscheidungen? Wie lösen wir das Koordinationsproblem? Warum ist es weiter problematisch, Open Source und kommerzielle Software klar trennen zu wollen? Was ist nun die Überlappung zwischen Open Source/Protocol und Souveränität? »Souveränität bedeutet, dass ich genügend Handlungsoptionen in einem komplexen Umfeld habe. Jeder Mechanismus, der mir das ermöglicht, erhöht meine Souveränität.« Was sind Software-agnostische Daten? Was sind Protokolle und warum sind solche, die sich als Standard etabliert haben, kaum mehr wegzubekommen? Was bedeutet dies im Kontext der digitalen Souveränität? Software — alles schnell, Programme von gestern spielen keine Rolle mehr, jeden Tag eine neue App? Oder läuft wesentliche Software über Jahrzehnte, oder noch länger? Und die Daten, mit denen operiert wird, haben noch wesentlich längere Lebenszyklen. Wie gehen wir im Zeitalter der Digitalisierung damit um? Es gibt auch in der Privatindustrie Beispiele, wo Geschäftsfälle Daten und Code über ein Jahrhundert gewartet und betrieben werden müssen. Was bedeutet dies vor allem auch für die gesellschaftliche Kontrolle dieser Infrastrukturen. Ich provoziere: Wenn wir aber der Realität der letzten Jahrzehnte ins Auge blicken so sind wir (in Europa) nicht längst eine digitale Kolonie und versuchen jetzt den Zwergenaufstand? Kein einziges der weltweit größten 25 Unternehmen (die ersten zehn fast ausschließlich IT-Unternehmen) ist europäisch und auch in einer Bewertung kritischer Technologien und deren Führerschaft spielt Europa keine Rolle. Haben wir also in Europa in allen wesentlichen Aspekten den Anschluss verloren? Was gibt es überhaupt noch zu tun? Wilfried bringt die »Gegenprovokation«: »Jedes System erlebt, bevor es zusammenkracht, seine große Blüte.« Wer wird gewinnen? Der Tyrannosaurus Rex oder die Säugetiere? Ist diese Metapher zutreffend? Welche unserer Provokationen gewinnt?
Kenneth Finnegan entertained us with stories about accidentally contributing to the internet's ability to network. Wondering how the internet works? All those terms about IPv4, IPv6, BGP, OSPF, CDN and other alphabet soup? Check out the YouTube videos by NetworkChuck. Kenneth writes about his adventures on his blog, The Life of Kenneth. Some of the posts related to this show are: Creating an Internet Exchange for Even More Fun and Less Profit Building an Anycast Secondary DNS Service Building the Micro Mirror Free Software CDN We also mention FCIX aka fcix.net or the Fremont Cabal Internet Exchange You can also find Kenneth at @kwf@social.afront.org where you will find more about half-dollars, nickels, and trains. If you also secretly long to run a locomotive, take a look at the Run-A-Locomotive program at WPRM. The title is related to the XKCD comic 2347: Dependency. Transcript
Ed, Nick, and Tom discuss the need for Network Address Translation v6 to v6 (NAT66). While Network Prefix Translation (NPTv6) exists, its limitations make it insufficient for real-world business needs. They also highlight that without a standardized NAT66, the market is forcing vendors to implement their own, hindering widespread IPv6 adoption. Episode Links: IPv6-to-IPv6 Network... Read more »
Today, Ethan and Holly provide an overview of firewalls. While cybersecurity is a separate discipline from network engineering, much of what happens in cybersecurity is interesting at the packet level, so there’s a good deal of overlap. It's likely that as a network engineer, you'll be managing, or at least dealing with, firewalls in your... Read more »
Ed, Nick, and Tom discuss the need for Network Address Translation v6 to v6 (NAT66). While Network Prefix Translation (NPTv6) exists, its limitations make it insufficient for real-world business needs. They also highlight that without a standardized NAT66, the market is forcing vendors to implement their own, hindering widespread IPv6 adoption. Episode Links: IPv6-to-IPv6 Network... Read more »
Are you struggling to get IPv6 working, whether in a lab or even a pilot deployment? Ed, Nick, and Tom walk through the essentials of IPv6 troubleshooting, revealing the non-negotiable differences between IPv4 and IPv6 that can trip up even experienced network engineers. They break down why blocking all ICMP, like in v4, will instantly... Read more »
Quality of Service (QoS) is a huge topic with a punishingly large group of acronyms. Join Ethan and Holly as they help you build a mental framework of what QoS is and what it solves. Not only do they break down essential acronyms, they also discuss QoS fundamentals, define the major groups of QoS tools,... Read more »
Are you struggling to get IPv6 working, whether in a lab or even a pilot deployment? Ed, Nick, and Tom walk through the essentials of IPv6 troubleshooting, revealing the non-negotiable differences between IPv4 and IPv6 that can trip up even experienced network engineers. They break down why blocking all ICMP, like in v4, will instantly... Read more »
In this episode of PING, APNIC Chief Scientist Geoff Huston returns with his annual review of BGP, reflecting on developments across 2025. Geoff has been publishing this year-in-review analysis of BGP dynamics for more than a decade, and this time he has uncovered some genuinely surprising shifts. His 2025 analysis has been published in two parts on the APNIC Blog. Border Gateway Protocol (BGP) is the mechanism by which network operators announce their Internet address space to the rest of the world and, in turn, learn about the addresses announced by others. Operators participating in the global default-free zone receive all publicly announced routes, each expressed as an IP prefix and associated with its originating Autonomous System Number (ASN). Every BGP speaker has a unique ASN, and all routing information is exchanged and interpreted through this fundamental identifier. In effect, the ASN is the basic unit of interdomain routing. BGP also carries path information that describes how routing announcements traverse the network. This data informs routing policy decisions — which paths to prefer, and through which commercial or technical relationships. While the protocol itself is well understood, the system as a whole is anything but simple. When more than 100,000 ASes are continuously exchanging routing information, complexity is unavoidable. Speaking BGP is about telling things and learning things, but it's also about deciding what to do with what has been learned. This is the work behind a router, and involves holding all the information and performing routing decisions on it, so the ‘size' of the information shared and learned has a direct impact on the ‘cost' of operating as a BGP speaker (cost here ultimately means memory and CPU). For most of the Internet's history, BGP growth has been relentless, forcing operators to continually ask whether their current routing infrastructure can accommodate future growth. All technology adoption has a life cycle, and is often referred to as the ‘technology adoption curve'. New technologies start out expensive and scarce, become cheaper and widely adopted, and eventually reach a point of saturation where growth slows and replacement becomes the dominant driver. For much of its existence, the Internet has remained firmly in the rapid growth phase of this curve, with sustained increases in users, networks, and routing information. Geoff has detected changes in the pace of growth for both IPv4 and IPv6, which suggest the underlying economics behind investment in Internet, and growth in customers has reached it's saturation point: We are entering a time where BGP growth may not have the same dynamics we've been used to, and questions about capital investment in BGP routing and underlying Internet Addressing are not the same.
Thinking of setting up an IPv6 lab this year? Our hosts dive into a major update on building and testing modern IPv6 networks, focusing on the game-changing “IPv6-mostly” architecture. They break down the essential components you need to get this working, including DHCP Option 108 and the nitty gritty of client support. In this episode,... Read more »
Go beyond the basics to understand the mechanics that keep your default gateway from becoming a single point of failure. Ethan and Holly demystify Virtual Router Redundancy Protocol (VRRP), which helps provide network redundancy. They break down everything from the VRRP election protocol to the protocol's unique communication methods. They also look back at previous... Read more »
Thinking of setting up an IPv6 lab this year? Our hosts dive into a major update on building and testing modern IPv6 networks, focusing on the game-changing “IPv6-mostly” architecture. They break down the essential components you need to get this working, including DHCP Option 108 and the nitty gritty of client support. In this episode,... Read more »
Welcome back to PING for 2026 and season 6. This time on PING, we have a pair of interviews with students from the National Institute of Technology Karnataka, Surathkal (NITK), recorded last year at IETF 122. This is the second time we've heard from students from NITK. We previously heard from Vanessa Fernandes and Kavya Bhat when they attended IETF 119 in 2024. NITK is a large, technically focused university located on India's south-western coast in the state of Karnataka. The state is home to major technology hubs, such as Bengaluru and Mangaluru, alongside institutions like NITK, which play a key role in developing technical talent. Against this backdrop, it is unsurprising that NITK students show a strong interest in network technologies and Internet protocol development. Dr Mohit Tahiliani, Associate Professor at NITK, has led a multi-year program involving undergraduate, postgraduate, and postdoctoral researchers to engage with emerging Internet standards. Through this program, participants explore new ideas, contribute code, and take part in IETF hackathons and Working Group activities. This work has been supported in part by the APNIC Foundation. Last time with Vanessa and Kavya, we explored NITK's multi-year campus IPv6 deployment, which has been underway for some time. That work has included direct engagement with the IETF, with Dr Mohit Tahiliani's students attending alongside Nalini Eklins, who is involved both in the IPv6 deployment at NITK and in IPv6 standards work within the IETF. Since then, both students have gone on to work in networking roles or to pursue further study, reflecting the longer-term impact of sustained involvement in operational and standards-based Internet engineering. This time, we've got two different projects and NINE students to hear from. The first group is Rati Preethi Subramanian, Shriya Anil, Mahati Kalale, Anuhya Murki and Supradha Bhat, who explored fair queuing disciplines, FQ_Codel, a derivative FQ_Codel++ and a new proposed model, FQ_Pie. They worked with the NS3 network simulator and CCPerf, exploring how these queueing disciplines compare, and discussed their project with me at IETF 122. The second group are Vartika T Rao, Hayyan Arshad, Siddharth Bhat and Bharadwaja Meherrushi Chittapragada, who looked at the YANG data model in the network management space, and more efficient ways to manage data coming out of networking systems using YANG. They wrote a producer-consumer model in Python code, and explored time-series databases using interface packet count collections as an example YANG dataset to explore, in the CBOR encoding. Finally, I spoke with Dr Mohit Tahiliani, who has been leading this project. He is strongly committed to bringing new and younger voices into IETF work, recognizing the value of exposing students to real-world protocol development early in their careers. This experience benefits participants by grounding their learning in practical standards work, while also helping the IETF engage with new contributors who may return to protocol development in the future. This sustained engagement has already had tangible outcomes: The students involved have gone on to roles in the ICT sector or to further academic study, demonstrating the long-term value of this collaborative model.
Send us a textThis week on The Route to Networking podcast, Ben Davies is joined by James Garcia, Director of Data Centre Management at RunPod. James shares his journey from growing up around networking equipment in his garage to helping build AI-ready infrastructure at scale.He talks about scaling Speedtest's global network from thousands to tens of thousands of servers, the shift to IPv6, and how that experience prepared him for the demands of modern AI workloads.At RunPod, James is focused on building high-performance GPU clusters and serverless inference platforms that can spin up in minutes and scale to extreme demand. He explains why hardware, cloud and AI skills are now more connected than ever.James finishes with practical advice for young engineers, why simplicity and trust shape his leadership style, and the episode wraps up with the quick-fire round.
Will Microsoft's CLAT bring widespread adoption rates for IPv6? Will there be significant advancements in corporate and cloud adoption as well? Will this finally be the year we see the fix for the RFC 6724? Ed Horley, Tom Coffeen, and Nick Buraglio make their predictions for the new year in the first IPv6 Buzz of... Read more »
Ethan and Holly discuss the major differences between In-band and Out-of-band (OOB) management and the pros and cons of both. They explore how to implement a proper OOB network and critical use cases where OOB is required. They also explain the differences and roles of the data plane, the control plane, and the management plane.... Read more »
Will Microsoft's CLAT bring widespread adoption rates for IPv6? Will there be significant advancements in corporate and cloud adoption as well? Will this finally be the year we see the fix for the RFC 6724? Ed Horley, Tom Coffeen, and Nick Buraglio make their predictions for the new year in the first IPv6 Buzz of... Read more »
In this episode of the Crazy Wisdom Podcast, host Stewart Alsop sits down with Mike Bakon to explore the fascinating intersection of hardware hacking, blockchain technology, and decentralized systems. Their conversation spans from Mike's childhood fascination with taking apart electronics in 1980s Poland to his current work with ESP32 microcontrollers, LoRa mesh networks, and Cardano blockchain development. They discuss the technical differences between UTXO and account-based blockchains, the challenges of true decentralization versus hybrid systems, and how AI tools are changing the development landscape. Mike shares his vision for incentivizing mesh networks through blockchain technology and explains why he believes mass adoption of decentralized systems will come through abstraction rather than technical education. The discussion also touches on the potential for creating new internet infrastructure using ad hoc mesh networks and the importance of maintaining truly decentralized, permissionless systems in an increasingly surveilled world. You can find Mike in Twitter as @anothervariable.Check out this GPT we trained on the conversationTimestamps00:00 Introduction to Hardware and Early Experiences02:59 The Evolution of AI in Hardware Development05:56 Decentralization and Blockchain Technology09:02 Understanding UTXO vs Account-Based Blockchains11:59 Smart Contracts and Their Functionality14:58 The Importance of Decentralization in Blockchain17:59 The Process of Data Verification in Blockchain20:48 The Future of Blockchain and Its Applications34:38 Decentralization and Trustless Systems37:42 Mainstream Adoption of Blockchain39:58 The Role of Currency in Blockchain43:27 Interoperability vs Bridging in Blockchain47:27 Exploring Mesh Networks and LoRa Technology01:00:25 The Future of AI and DecentralizationKey Insights1. Hardware curiosity drives innovation from childhood - Mike's journey into hardware began as a child in 1980s Poland, where he would disassemble toys like battery-powered cars to understand how they worked. This natural curiosity about taking things apart and understanding their inner workings laid the foundation for his later expertise in microcontrollers like the ESP32 and his deep understanding of both hardware and software integration.2. AI as a research companion, not a replacement for coding - Mike uses AI and LLMs primarily as research tools and coding companions rather than letting them write entire applications. He finds them invaluable for getting quick answers to coding problems, analyzing Git repositories, and avoiding the need to search through Stack Overflow, but maintains anxiety when AI writes whole functions, preferring to understand and write his own code.3. Blockchain decentralization requires trustless consensus verification - The fundamental difference between blockchain databases and traditional databases lies in the consensus process that data must go through before being recorded. Unlike centralized systems where one entity controls data validation, blockchains require hundreds of nodes to verify each block through trustless consensus mechanisms, ensuring data integrity without relying on any single authority.4. UTXO vs account-based blockchains have fundamentally different architectures - Cardano uses an extended UTXO model (like Bitcoin but with smart contracts) where transactions consume existing UTXOs and create new ones, keeping the ledger lean. Ethereum uses account-based ledgers that store persistent state, leading to much larger data requirements over time and making it increasingly difficult for individuals to sync and maintain full nodes independently.5. True interoperability differs fundamentally from bridging - Real blockchain interoperability means being able to send assets directly between different blockchains (like sending ADA to a Bitcoin wallet) without intermediaries. This is possible between UTXO-based chains like Cardano and Bitcoin. Bridges, in contrast, require centralized entities to listen for transactions on one chain and trigger corresponding actions on another, introducing centralization risks.6. Mesh networks need economic incentives for sustainable infrastructure - While technologies like LoRa and Meshtastic enable impressive decentralized communication networks, the challenge lies in incentivizing people to maintain the hardware infrastructure. Mike sees potential in combining blockchain-based rewards (like earning ADA for running mesh network nodes) with existing decentralized communication protocols to create self-sustaining networks.7. Mass adoption comes through abstraction, not education - Rather than trying to educate everyone about blockchain technology, mass adoption will happen when developers can build applications on decentralized infrastructure that users interact with seamlessly, without needing to understand the underlying blockchain mechanics. Users should be able to benefit from decentralization through well-designed interfaces that abstract away the complexity of wallets, addresses, and consensus mechanisms.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. But an attacker must be on the same network. https://www.freebsd.org/security/advisories/FreeBSD-SA-25:12.rtsold.asc NIST Time Server Problems The atomic ensemble time scale at the NIST Boulder campus has failed due to a prolonged utility power outage. One impact is that the Boulder Internet Time Services no longer have an accurate time reference. https://tf.nist.gov/tf-cgi/servers.cgi https://groups.google.com/a/list.nist.gov/g/internet-time-service/c/o0dDDcr1a8I
Kubernetes is a popular container orchestration platform. Today’s IPv6 Buzz episode explores the benefits of using IPv6 in Kubernetes, and how Kubernetes uses IP addresses in both the control plane and data plane.We also address why the adoption rate is estimated to be so low, from default configurations to issues with non-IPv6-aware applications inside containers.... Read more »
If you’re curious as to what Ethan and Holly have in store for 2026, they give you a sneak peak on today’s episode. Hint: Some of these topics might include letters like B, G, P, Q, o, S, A and I. They also take time in this episode to answer listener questions, ranging from how... Read more »
Kubernetes is a popular container orchestration platform. Today’s IPv6 Buzz episode explores the benefits of using IPv6 in Kubernetes, and how Kubernetes uses IP addresses in both the control plane and data plane.We also address why the adoption rate is estimated to be so low, from default configurations to issues with non-IPv6-aware applications inside containers.... Read more »
The newly published RFC 9898 is the discussion of today’s podcast. The IPv6 Buzz crew explore the complexities of neighbor discovery and review solutions for both operators and architects. They share how this RFC serves as a single, detailed resource to improve your understanding of neighbor discovery and to reduce the potential attack surface in... Read more »
In Part 1 of Redundancy vs. High Availability, we said that sometimes high availability and redundancy are considered to be the same thing, but we disagree. Holly and Ethan do agree that high availability can be considered a network design goal, and that redundancy is just one technique that can be used to help make... Read more »
The newly published RFC 9898 is the discussion of today’s podcast. The IPv6 Buzz crew explore the complexities of neighbor discovery and review solutions for both operators and architects. They share how this RFC serves as a single, detailed resource to improve your understanding of neighbor discovery and to reduce the potential attack surface in... Read more »
Audrey talks with cloud-server DIYer Drew Lyton about what its like trying to rebuild the internet in your living room. Also: LASERLAKE–Become a Never Post member at https://www.neverpo.st/ for access to extended and bonus segments, and our side shows like “Slow Post”, “Posts from the Field” and “Never Watch”– Call us at 651 615 5007 to leave a voicemail Drop us a voice memo via airtable Or email us at theneverpost at gmail dot com –It's the Radiotopia Fundraiser! Click here to donate to all your faves!$4 $7 Never Post Membership Tier$4 $12 Never Post Membership TierIntro Links Reservation of IPv6 Address Block 44::/16 for Amateur Radio Digital Communications (44Net) Unofficial IETF draft calls for grant of five nonillion IPv6 addresses to ham radio operators iHeartRadio Exec Says Company Won't ‘Play AI Music' or Use ‘AI Generated Personalities' in Staff Memo The Current No. 1 Christian Artist Has No Soul Forrest Frank on IG Poems Can Trick AI Into Helping You Make a Nuclear Weapon Dating algorithms? Investigating the reciprocal relationships between partner choice FOMO, decision fatigue, excessive swiping, and trust in algorithms on dating apps –Don't Do It Yourself Drew's blog Drew's website –Never Post's producers are Audrey Evans, Georgia Hampton and The Mysterious Dr. Firstname Lastname. Our senior producer is Hans Buetow. Our executive producer is Jason Oberholtzer. The show's host is Mike Rugnetta.Tresspasser. A high stone wall. I continue to obsessively study ‘improving your hurdle technique' online, the red curve of the track guiding from the right to the left of the image as drills, minidisciplines, are suggested. Over and over. I was young when I heard recounted to me the terror and excitement of being chased of farmland, thinking there was a gun, scaling over to escape with superhuman force. Even then, I wanted to be a part of the chase.Excerpt of The [blank] jumped over the [blank] (along a line a leap a landing) by Rowan PowellNever Post is a production of Charts & Leisure and is distributed by Radiotopia
What does it take for an entire country to adopt IPv6? Our guest today is Tenanoia (Noia) Simona, CEO of Tuvalu Telecommunications Corporation, the country's sole telecommunications provider. She's here to walk us through the difficulties of connecting the many islands of Tuvalu and their journey to achieving one of the world's highest IPv6 adoption... Read more »
In today’s chat, Holly and Ethan consider a question from listener Douglas who asks, “How do you approach designing a network for high availability and redundancy?” They start by defining differences between redundancy and high availability, and talk about Holly’s experience with her own customers. Then they share examples of how to achieve redundancy in... Read more »
What does it take for an entire country to adopt IPv6? Our guest today is Tenanoia (Noia) Simona, CEO of Tuvalu Telecommunications Corporation, the country's sole telecommunications provider. She's here to walk us through the difficulties of connecting the many islands of Tuvalu and their journey to achieving one of the world's highest IPv6 adoption... Read more »
Online game design veteran Raph Koster recently posted a new piece about how he thinks about game design, which got us talking about the history of online multiplayer, so then we figured, why not talk about that subject in a (slightly) more comprehensive way on this podcast? So that's what we did this week, dipping into topics like pre-TCP/IP network gaming, the early video game consoles' various half-baked online solutions, how Ultima Online and Star Wars Galaxies were both way ahead of their time, how much the infrastructure has evolved for facilitating multiplayer -- and how expected it is as a feature these days -- and plenty more.Koster's new piece: https://www.raphkoster.com/2025/11/03/game-design-is-simple-actually/PC Gamer's Everquest history: https://www.pcgamer.com/breaking-the-internet-the-story-of-everquest-the-mmo-that-changed-everything/Dreamcast online functionality and Sega.net history (with links to similar pages for PS2, GameCube etc. at the bottom): https://en.wikipedia.org/wiki/Dreamcast_online_functionality Support the Pod! Contribute to the Tech Pod Patreon and get access to our booming Discord, a monthly bonus episode, your name in the credits, and other great benefits! You can support the show at: https://patreon.com/techpod
Do planned economies, like China, have an advantage in deploying IPv6? What do the numbers on the DFZ show? George Michaelson joins Russ and Tom to discuss.
Today the IPv6 Buzz crew provides updates on the latest in IPv6 standards, RFCs, and best practices. They break down the recent discussions around RFC 6052, explore the options for RFC 8215, and share Nick's spin on the now defunct testipv6.com site. Episode Links: RFC 6052 RFC 8215 RFC 6598 IPv6.army
MACsec is a protocol for encrypting Ethernet frames on a local (though not always local) network. Ethan Banks and Holly Metlitzky have an ELI5 (explain like I’m 5) discussion as to what exactly is MACsec and how it differs from IPsec. They talk about when and whether you need to implement MACsec with all the... Read more »
Today the IPv6 Buzz crew provides updates on the latest in IPv6 standards, RFCs, and best practices. They break down the recent discussions around RFC 6052, explore the options for RFC 8215, and share Nick’s spin on the now defunct testipv6.com site. Episode Links: RFC 6052 RFC 8215 RFC 6598 IPv6.army
professorjrod@gmail.comEver wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Along the way, we share practical stories from classrooms, offices, and coffee shops that turn abstract packets into clear mental models.We go deeper than definitions. You'll learn how scopes shape address pools, why reservations keep printers stable, and how APIPA exposes broken paths with 169.254.x.x clues. In segmented environments, relays and the GIADDR field become the traffic cops that steer requests to the right subnet; misconfigure them and clients get stranded. Security gets real too: rogue DHCP can poison DNS, starvation floods can exhaust pools, and well‑meaning mesh gear can become a second server. We detail protective moves like DHCP snooping, port security, and rate limiting, plus how snooping's binding tables feed stronger Layer 2 defenses.Resilience matters, so we unpack failover strategies—hot standby, load balancing, and legacy split scopes—and the rich set of DHCP options that deliver DNS, NTP, TFTP, and VoIP boot settings. We also tackle IPv6 with a sober lens: where SLAAC fits, when DHCPv6 is still essential, and why economics slow change even as IPv4 addresses remain scarce. If you support users, we hand you a troubleshooting playbook: spot APIPA, check relays, expand scopes, and use ipconfig release/renew to solve issues methodically and ace help desk interviews.If this helped you see the network with new eyes, tap follow, share with a teammate, and leave a quick review. Got a DHCP puzzle or a rogue gear story? Send it our way and we might feature it next time.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
This show has been flagged as Explicit by the host. New hosts Welcome to our new hosts: Kirbotica, Thibaut, candycanearter. Last Month's Shows Id Day Date Title Host 4478 Wed 2025-10-01 YouTube Subscriptions 2025 #6 Ahuka 4479 Thu 2025-10-02 Who is the Algernon for Whom are the Flowers? Antoine 4480 Fri 2025-10-03 Arthur C. Clarke Becomes Successful Ahuka 4481 Mon 2025-10-06 HPR Community News for September 2025 HPR Volunteers 4482 Tue 2025-10-07 doodoo 4 the double deuce Jezra 4483 Wed 2025-10-08 HPR Beer Garden 3 - Porters Kevie 4484 Thu 2025-10-09 When Your Dentist Uses ChatControl Logic Trollercoaster 4485 Fri 2025-10-10 Git for Github and Gitlab Archer72 4486 Mon 2025-10-13 A code off my mind Lee 4487 Tue 2025-10-14 Is AI autistic? Antoine 4488 Wed 2025-10-15 Cheap Yellow Display Project Part 2: What is the problem? Trey 4489 Thu 2025-10-16 Hacks Poetic - Pilot Episode Kirbotica 4490 Fri 2025-10-17 Playing Civilization V, Part 4 Ahuka 4491 Mon 2025-10-20 Thibaut and Ken Interview David Revoy Thibaut 4492 Tue 2025-10-21 How to do a distribution upgrade of an Ubuntu LTS on a Digital Ocean droplet Rho`n 4493 Wed 2025-10-22 HPR Beer Garden 4 - Weissbier Kevie 4494 Thu 2025-10-23 Exploring FUTO Keyboard Antoine 4495 Fri 2025-10-24 An introduction to Taskwarrior candycanearter 4496 Mon 2025-10-27 Stroopwafel Lee 4497 Tue 2025-10-28 fixing 328eforth Brian-in-Ohio 4498 Wed 2025-10-29 Living the Tux Life Episode 1 Al 4499 Thu 2025-10-30 Greg Farough and Zoë Kooyman of the FSF interview Librephone lead developer Rob Savoye Ken Fallon 4500 Fri 2025-10-31 Arthur C. Clarke: 2001 and Sequels Ahuka Comments this month These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 41 comments in total. Past shows There are 12 comments on 7 previous shows: hpr4238 (2024-10-30) "Snaps are better than flatpaks" by Some Guy On The Internet. Comment 4: BA on 2025-10-05: "Not a fan of any of them." hpr4453 (2025-08-27) "IPv6 for Luddites" by beni. Comment 7: Beni on 2025-10-22: "Link to the mentioned IPv6 talk on EuroBSDcon 2025" hpr4470 (2025-09-19) "HPR is twenty years old today. " by Lee. Comment 3: Steve Barnes on 2025-10-12: "Les petites félicites!" hpr4474 (2025-09-25) "Hacker Poetry - 001" by Major_Ursa. Comment 1: candycanearter07 on 2025-10-01: "love it" hpr4475 (2025-09-26) "The true audio file for walking tune to(wards) a friend" by FredBlack. Comment 1: brian-in-ohio on 2025-10-14: "Why fret about frets?" Comment 2: Folky on 2025-10-15: "Frets?" hpr4476 (2025-09-29) "Does AI cause brain damage?" by Trollercoaster. Comment 3: enistello on 2025-10-01: "Wonderful episode" Comment 4: Trollercoaster on 2025-10-02: "Re: Wondeful episode" hpr4477 (2025-09-30) "doodoo 3 a deuce plus 1" by Jezra. Comment 1: candycanearter07 on 2025-10-02: "cool app but" Comment 2: Archer72 on 2025-10-05: "Re: cool app" Comment 3: candycanearter07 on 2025-10-06: "Re: Re: cool app" Comment 4: أحمد المحمودي on 2025-10-07: "I use todoman" This month's shows There are 29 comments on 12 of this month's shows: hpr4478 (2025-10-01) "YouTube Subscriptions 2025 #6" by Ahuka. Comment 1: Anonymous 27 on 2025-10-02: "Excellent recommendations" hpr4479 (2025-10-02) "Who is the Algernon for Whom are the Flowers?" by Antoine. Comment 1: Trey on 2025-10-02: "Very interesting"Comment 2: Anonymous 27 on 2025-10-06: "Required Futurama reference" hpr4480 (2025-10-03) "Arthur C. Clarke Becomes Successful" by Ahuka. Comment 1: Archer72 on 2025-10-13: "Great show... and may the force be with you"Comment 2: Kevin O'Brien on 2025-10-13: "Thank you" hpr4483 (2025-10-08) "HPR Beer Garden 3 - Porters" by Kevie. Comment 1: Archer72 on 2025-10-16: "History of beer" hpr4484 (2025-10-09) "When Your Dentist Uses ChatControl Logic" by Trollercoaster. Comment 1: Trollercoaster on 2025-10-09: "Voting has been delayed"Comment 2: candycanearter07 on 2025-10-12: "Satire as a tool"Comment 3: Trollercoaster on 2025-10-14: "Re: Satire as a tool"Comment 4: operat0r on 2025-10-16: "Lol"Comment 5: Trollercoaster on 2025-10-20: "Re: Lol" hpr4485 (2025-10-10) "Git for Github and Gitlab" by Archer72. Comment 1: candycanearter07 on 2025-10-21: "useful introduction"Comment 2: Sayaci on 2025-10-21: "The content of the Archer72" hpr4486 (2025-10-13) "A code off my mind" by Lee. Comment 1: Trey on 2025-10-13: "Excellent perspectives " hpr4489 (2025-10-16) "Hacks Poetic - Pilot Episode" by Kirbotica. Comment 1: Ken Fallon on 2025-10-16: "What a waste !"Comment 2: Trey on 2025-10-16: "Thought provoking..."Comment 3: Claudio on 2025-10-16: "A Refreshing HPR Episode!"Comment 4: Alexander on 2025-10-17: "Just threw my iPhone in the ocean..."Comment 5: Kevin O'Brien on 2025-10-17: "I loved the show"Comment 6: Tori on 2025-10-21: "When Nostalgia Meets the Digital Age"Comment 7: brian-in-ohio on 2025-10-22: "Don't burn out" hpr4491 (2025-10-20) "Thibaut and Ken Interview David Revoy" by Thibaut. Comment 1: brian-in-ohio on 2025-10-22: "Great show"Comment 2: Henrik Hemrin on 2025-10-26: "Inspiring" hpr4493 (2025-10-22) "HPR Beer Garden 4 - Weissbier" by Kevie. Comment 1: folky on 2025-10-22: "Hefeweizen is best ;-) "Comment 2: paulj on 2025-10-22: "Great Episode!"Comment 3: Claudio on 2025-10-23: "Great Episode I Can Relate To!"Comment 4: Gan Ainm on 2025-10-26: "Scottish-Bavarian IPW" hpr4495 (2025-10-24) "An introduction to Taskwarrior" by candycanearter. Comment 1: Archer72 on 2025-10-15: "First show: Good explanation" hpr4500 (2025-10-31) "Arthur C. Clarke: 2001 and Sequels" by Ahuka. Comment 1: Archer72 on 2025-10-16: "Deep dive" Mailing List discussions Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mailing List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman. The threaded discussions this month can be found here: https://lists.hackerpublicradio.com/pipermail/hpr/2025-October/thread.html Events Calendar With the kind permission of LWN.net we are linking to The LWN.net Community Calendar. Quoting the site: This is the LWN.net community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page.Provide feedback on this episode.
RFC 9872 makes recommendations for NAT64 prefix discovery for hosts supporting v4-to-v6 translation. Co-host Nick Buralgio is a co-author of this RFC, so we’re taking the opportunity to talk about it in detail. We discuss the problems RFC 9872 is addressing and why a new RFC was needed for operational guidance, not necessarily defining a... Read more »
If you’ve ever wondered what the difference is between a Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB), today’s show is for you! Ethan Banks and Holly Metlitzky start with some history and the basics of communication between layer 2 and layer 3 and then explain how the concepts of SVI and IRB... Read more »
RFC 9872 makes recommendations for NAT64 prefix discovery for hosts supporting v4-to-v6 translation. Co-host Nick Buralgio is a co-author of this RFC, so we’re taking the opportunity to talk about it in detail. We discuss the problems RFC 9872 is addressing and why a new RFC was needed for operational guidance, not necessarily defining a... Read more »
professorjrod@gmail.comEver wish the network would just explain itself? We walk through the real language of connectivity—how links come alive, how packets choose their paths, and how a few core ideas unlock routers, firewalls, addressing, and the exam questions that test them. It starts with the wire (and the air): DSL over copper, cable scaling with DOCSIS, fiber to an ONT at your home, and why fixed wireless, satellite, and 5G fill coverage gaps with very different tradeoffs in speed and latency. From there, we draw the line between moving traffic and governing it. Routers forward based on IP and subnets; firewalls enforce policy using IPs, protocols, and ports—think velvet rope, but for packets.We bring the TCP/IP stack down to earth with a clean mental model of layers and encapsulation, then dig into IPv4 addressing, subnet masks, and private ranges that rely on NAT to share a single public IP. You'll learn why static IPs belong on printers and servers, how DHCP's DORA flow keeps clients online, and what APIPA is telling you when a lease fails. We also size up IPv6—128-bit addresses, hexadecimal notation, dual stack—and unpack the practical roadblocks that slow adoption despite the promise of massive address space.Transport choices make or break performance, so we compare TCP's three‑way handshake and delivery guarantees with UDP's low-latency approach favored by streaming and gaming. We highlight the ports every tech should know—22, 53, 80, 443, 67/68, 21/20, 3389—because port literacy speeds troubleshooting. On identity and isolation, we translate DNS records (A, AAAA, CNAME, MX, TXT) into everyday use and show how VLANs reduce broadcast noise while VPNs protect data over untrusted networks. To cement it all, we run live quiz walkthroughs and model how to spot keywords, eliminate distractors, and reason under time pressure—skills you can carry straight into the CompTIA A+ and beyond.If this helped you think more clearly about networks, follow the show, leave a rating, and share it with a friend who's studying. Got a topic you want us to deep-dive next—DHCP, DNS, or VLANs? Drop a note and subscribe so you don't miss the next breakdown.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Sometimes weirdness occurs within DNS if you’re on an IPv4 network and you connect to a dual-stack or v6-only VPN. Maybe the browser doesn’t connect, but you can still send pings, or vice versa. Is the OS getting confused about which stack and which order of interfaces to request services? Is the weird behavior being... Read more »
The job interview is an inescapable part of a career journey. Today on N Is For Networking, we conduct a mock interview with a candidate who's applying for a junior network administration role. The goal is to give Toni Mrowetz, our candidate, feedback. At the same time, we hope this helps anyone listening who might... Read more »
If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but today we’re going to discuss why you’d want to and how you can do that with guest Anton Lönnerbro. Anton is a solutions architect at a managed service provider... Read more »
If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but today we’re going to discuss why you’d want to and how you can do that with guest Anton Lönnerbro. Anton is a solutions architect at a managed service provider... Read more »
If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but today we’re going to discuss why you’d want to and how you can do that with guest Anton Lönnerbro. Anton is a solutions architect at a managed service provider... Read more »
We’re diving into another IPv6 Basics today with the topic of dual-stack, which means running the IPv4 and IPv6 protocol stacks simultaneously. We get many questions about the implications of running dual-stack, and in this episode we’ll provide answers. We start by getting a little finicky about the definition of dual-stack, and then talk about... Read more »
We dive back into the world of IPsec with an episode dedicated to configuring IPsec tunnels. After discussing a listener comment regarding transport mode in IPsec tunnels, Ethan Banks and Holly Metlitzky work through topics such as multi-vendor IPsec configuration, licensing, and the details of configuration and routing. Bonus material: MTU size and NAT-T. Episode... Read more »
Today we talk about measuring IPv6 and IPv6 statistics. We talk about why it’s useful to measure IPv6, how to track v6 deployment initiatives, and tools to help with your measurements. Episode Links: Google IPv6 – Google IPv6 Global Statistics Dashboard IPv6 Enabled – Hexabuild Episode Transcript: This episode was transcribed by AI and lightly... Read more »