About
DEC, PAIX, MAPS, ISC, MFN/Abovenet, Farsight; BIND, Cron, dnscap, dnsdbq; BSD…
Articles by Paul
Activity
-
How many APIs do you have? What risks do your APIs pose? Are your APIs under attack? Vercara can help with UltraAPI! Ask me about it. #apisecurity…
How many APIs do you have? What risks do your APIs pose? Are your APIs under attack? Vercara can help with UltraAPI! Ask me about it. #apisecurity…
Liked by Paul Vixie
-
People won't forget what you did when it was their turn in the hot seat, for good or ill. And everyone gets a turn in the hot seat.
People won't forget what you did when it was their turn in the hot seat, for good or ill. And everyone gets a turn in the hot seat.
Liked by Paul Vixie
-
A respectful PSA/reminder to the security industry. The same way we should avoid punch-down claims of "we would have blocked X outbreak/incident" in…
A respectful PSA/reminder to the security industry. The same way we should avoid punch-down claims of "we would have blocked X outbreak/incident" in…
Liked by Paul Vixie
Experience
Education
-
Keio University
-
Activities and Societies: WIDE
"Design and Implementation of Advanced Domain Name System Infrastructure"
Volunteer Experience
-
sysadmin
Op Sec Trust
- Present 17 years 7 months
Science and Technology
Wrote terrible prototype code. Operated infrastructure. Invited others.
-
volunteer
Lawrence Berkeley National Laboratory
- less than a year
Science and Technology
learned ratfor and conquest.
-
Member of SSAC
ICANN
- Present 22 years 5 months
Science and Technology
Member of ICANN Security and Stability Advisory Committee (SSAC), formerly SECSAC.
Publications
-
Bootstrapping Communications into an Anti-Censorship System
2nd USENIX Workshop on Free and Open Communications on the Internet
Adversary-resistant communication bootstrapping is
a fundamental problem faced by many circumvention
(anti-censorship) systems such as Tor. Censoring regimes
actively harvest and block published Tor entry points and
bridge nodes. More recently, some countries have resorted
to reactive (follow-up) probing of the destination hosts
of outbound encrypted traffic to identify unpublished Tor
nodes. We present the design of a new architecture for
bypassing censorship, called…Adversary-resistant communication bootstrapping is
a fundamental problem faced by many circumvention
(anti-censorship) systems such as Tor. Censoring regimes
actively harvest and block published Tor entry points and
bridge nodes. More recently, some countries have resorted
to reactive (follow-up) probing of the destination hosts
of outbound encrypted traffic to identify unpublished Tor
nodes. We present the design of a new architecture for
bypassing censorship, called DEFIANCE, that extends
Tor with resilience to both active harvesting and network
scanning attacks. The first goal is accomplished using
the DEFIANCE Rendezvous Protocol (RP), and the second
is achieved using a novel handshake that we call
Address-Change Signaling (ACS). We describe prototype
implementations of both components, discuss the limits
of our architecture, and evaluate what it would take for
a determined adversary to defeat our system. While we
develop our prototype components over Tor, their design
can be easily extended to other circumvention systems.Other authorsSee publication -
Sendmail: Theory and Practice
Digital Press
Explained how to wire up an Internet mail gateway to UUCP and DECnet.
Patents
-
Internet communication system
Issued US 6,581,090
The present invention relates to the transferring of information on the Internet, comprising: means (40) for storing information, corresponding to information provided at an Internet content provider (60), at respective alternative addresses of said storing means; means (20) for intercepting an information request from an Internet user directed to an Internet content provider; means for determining whether or not the intercepted request is directed to an information content provider having an…
The present invention relates to the transferring of information on the Internet, comprising: means (40) for storing information, corresponding to information provided at an Internet content provider (60), at respective alternative addresses of said storing means; means (20) for intercepting an information request from an Internet user directed to an Internet content provider; means for determining whether or not the intercepted request is directed to an information content provider having an associated alternative address on said storing means (40); and means for directing the request to said alternative address if such an alternative address exists.
Other inventors -
Projects
-
ICANN Coordination
-
Working with ICANN to expand ICANN coordination in China, to significantly improve the internet resilience and user experience.
a. Extensive involvement in ICANN, APNIC, and IETF conferences over DNS stewardship. Created outreach campaign and deployed ICANN root name server instance in China. Boosted internet resiliency and user experience.
b. Delivered diligent contribution to the global community of internet as an active stakeholder.
c. Attended multiple ICANN conferences…Working with ICANN to expand ICANN coordination in China, to significantly improve the internet resilience and user experience.
a. Extensive involvement in ICANN, APNIC, and IETF conferences over DNS stewardship. Created outreach campaign and deployed ICANN root name server instance in China. Boosted internet resiliency and user experience.
b. Delivered diligent contribution to the global community of internet as an active stakeholder.
c. Attended multiple ICANN conferences. Redefined company image as global stakeholder through dedicated speeches, talks and presentations.
d. Business development with industry leaders to establish multi-level cooperation.
Other creators
Honors & Awards
-
Wolfgang von Kempelen award
Slovenskej technickej univerzity v Bratislave
"za vyznamny prinos k rozvoju internetu" ("for significant contribution to the development of the Internet").
-
Innovator, Internet Hall of Fame, Class of 2014
Internet Society
Languages
-
English
-
Organizations
-
IEEE, ACM, Usenix, ISOC
-
Recommendations received
5 people have recommended Paul
Join now to viewMore activity by Paul
-
The development of standards and best practices must accompany new innovations in AI to ease deployment and adoption of the technology in a…
The development of standards and best practices must accompany new innovations in AI to ease deployment and adoption of the technology in a…
Liked by Paul Vixie
-
Today during the Aspen Security Forum, my colleague Heather Adkins and I had the privilege of introducing the Coalition for Secure AI (CoSAI). This…
Today during the Aspen Security Forum, my colleague Heather Adkins and I had the privilege of introducing the Coalition for Secure AI (CoSAI). This…
Liked by Paul Vixie
-
Today we launched the Coalition for Secure AI (CoSAI) under OASIS, in collaboration with industry leaders like Amazon, Anthropic, Chainguard, Cisco…
Today we launched the Coalition for Secure AI (CoSAI) under OASIS, in collaboration with industry leaders like Amazon, Anthropic, Chainguard, Cisco…
Liked by Paul Vixie
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More