The legacy vulnerability of the Internet

This article documents developments over the last ten years at all layers of the network stack. It also highlights how vulnerable the current Internet is.

Links

Another ten years later