<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-05-02T15:50:00+00:00</dc:date>

	
	<item>
		<title> Illusory Correlation and Security (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210531-illusory-correlation-and-security</guid>
		<link>https://circleid.com/posts20210531-illusory-correlation-and-security</link>
		<description><![CDATA[Fear sells. Fear of missing out, fear of being an imposter, fear of crime, fear of injury, fear of sickness ... we can all think of times when people we know (or worse, people in the throes of madness of crowds) have made really bad decisions because they were afraid of something. Bruce Schneier has documented this a number of times. For instance: "it's smart politics to exaggerate terrorist threats" and ... <a href="https://circleid.com/posts20210531-illusory-correlation-and-security">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Loose Lips (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210412-loose-lips</guid>
		<link>https://circleid.com/posts20210412-loose-lips</link>
		<description><![CDATA[When I was in the military, we were constantly drilled about the problem of Essential Elements of Friendly Information, or EEFIs. What are EEFis? If an adversary can cast a wide net of surveillance, they can often find multiple clues about what you are planning to do or who is making which decisions. For instance, if several people married to military members all make plans to be without their spouses for a long period of time, the adversary can be certain that a unit is about to be deployed. <a href="https://circleid.com/posts20210412-loose-lips">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Insecurity of Ambiguous Standards (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20210330-the-insecurity-of-ambiguous-standards</guid>
		<link>https://circleid.com/posts20210330-the-insecurity-of-ambiguous-standards</link>
		<description><![CDATA[Why are networks so insecure? One reason is we don't take network security seriously. We just don't think of the network as a serious target of attack. Or we think of security as a problem "over there," something that exists in the application realm, that needs to be solved by application developers. Or we think the consequences of a network security breach as "well, they can DDoS us, and then we can figure out how to move load around, so if we build with resilience (enough redundancy)... <a href="https://circleid.com/posts20210330-the-insecurity-of-ambiguous-standards">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> IoT From a Network Perspective: Learning to Navigate the New Realms (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20201027-iot-from-a-network-perspective-learning-to-navigate-the-new-realms</guid>
		<link>https://circleid.com/posts20201027-iot-from-a-network-perspective-learning-to-navigate-the-new-realms</link>
		<description><![CDATA[Let's play the analogy game. The Internet of Things (IoT) is probably going end up being like... a box of chocolates, because you never do know what you are going to get? a big bowl of spaghetti with a serious lack of meatballs? Whatever it is, the IoT should have network folks worried about security. Of course, there is the problem of IoT devices being attached to random places on the network, exfiltrating personal data back to a cloud server you don't know anything about. <a href="https://circleid.com/posts20201027-iot-from-a-network-perspective-learning-to-navigate-the-new-realms">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Whither Cyber-Insurance? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20200302_whither_cyber_insurance</guid>
		<link>https://circleid.com/posts20200302_whither_cyber_insurance</link>
		<description><![CDATA[When you go to the doctor for a yearly checkup, do you think about health or insurance? You probably think about health, but the practice of going to the doctor for regular checkups began because of large life insurance companies in the United States. These companies began using statistical methods to make risk or to build actuarial tables they could use to set the premiums properly. Originally, life insurance companies relied on the "hunches" of their salesmen, combined with... <a href="https://circleid.com/posts20200302_whither_cyber_insurance">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Data, Applications, and the Meaning of the Network (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20191028_data_applications_and_the_meaning_of_the_network</guid>
		<link>https://circleid.com/posts20191028_data_applications_and_the_meaning_of_the_network</link>
		<description><![CDATA[Two things seem to be universally true in the network engineering space right this moment. The first is that network engineers are convinced their jobs will not exist, or there will only be network engineers "in the cloud" within the next five years. The second is a mad scramble to figure out how to add value to the business through the network. These two movements are, of course, mutually exclusive visions of the future. <a href="https://circleid.com/posts20191028_data_applications_and_the_meaning_of_the_network">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> If Demand Is Growing, Why Is Networking World Such a Depressing Place Right Now? Let's Dig Deeper... (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postsif_demand_is_growing_why_is_the_networking_world_such_a_depressing_place_ri</guid>
		<link>https://circleid.com/postsif_demand_is_growing_why_is_the_networking_world_such_a_depressing_place_ri</link>
		<description><![CDATA[Over at the ECI blog, Jonathan Homa has a nice <a href="https://blog.ecitele.com/network-planning-ready-for-a-starring-role">article</a> about the importance of network planning: In the classic movie, The Graduate (1967), the protagonist is advised on career choices, "In one word &ndash; plastics." If you were asked by a young person today, graduating with an engineering or similar degree about a career choice in telecommunications, would you think of responding, "network planning"? Well, probably not... <a href="https://circleid.com/postsif_demand_is_growing_why_is_the_networking_world_such_a_depressing_place_ri">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> There is Always a Back Door (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190812_there_is_always_a_back_door</guid>
		<link>https://circleid.com/posts20190812_there_is_always_a_back_door</link>
		<description><![CDATA[A long time ago, I worked in a secure facility. I won't disclose the facility; I'm certain it no longer exists, and the people who designed the system I'm about to describe are probably long retired. Soon after being transferred into this organization, someone noted I needed to be trained on how to change the cipher door locks. We gathered up a ladder, placed the ladder just outside the door to the secure facility, popped open one of the tiles on the drop ceiling, and opened a small metal box with a standard, low-security key. <a href="https://circleid.com/posts20190812_there_is_always_a_back_door">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> What's in Your DNS Query? (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190805_what_is_in_your_dns_query</guid>
		<link>https://circleid.com/posts20190805_what_is_in_your_dns_query</link>
		<description><![CDATA[Privacy problems are an area of wide concern for individual users of the Internet -- but what about network operators? Geoff Huston wrote an article earlier this year concerning privacy in DNS and the various attempts to make DNS private on the part of the IETF -- the result can be summarized with this long, but entertaining, quote. <a href="https://circleid.com/posts20190805_what_is_in_your_dns_query">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Gall's Law and the Network (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190513_galls_law_and_the_network</guid>
		<link>https://circleid.com/posts20190513_galls_law_and_the_network</link>
		<description><![CDATA[In Systemantics: How Systems Really Work and How They Fail, John Gall says: "A complex system that works is invariably found to have evolved from a simple system that worked. A complex system designed from scratch never works and cannot be patched up to make it work. You have to start over with a working simple system." In the software development world, this is called Gall's Law... <a href="https://circleid.com/posts20190513_galls_law_and_the_network">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Some Thought on the Paper: Practical Challenge-Response for DNS (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190311_some_thought_on_practical_challenge_response_for_dns</guid>
		<link>https://circleid.com/posts20190311_some_thought_on_practical_challenge_response_for_dns</link>
		<description><![CDATA[Because the speed of DNS is so important to the performance of any connection on the 'net, a lot of thought goes into making DNS servers fast, including optimized software that can respond to queries in milliseconds, and connecting DNS servers to the 'net through high bandwidth links. To set the stage for massive DDoS attacks based in the DNS system, add a third point: DNS responses tend to be much larger than DNS queries. <a href="https://circleid.com/posts20190311_some_thought_on_practical_challenge_response_for_dns">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> The Need for Sustainable Open Source Projects (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20190116_the_need_for_sustainable_open_source_projects</guid>
		<link>https://circleid.com/posts20190116_the_need_for_sustainable_open_source_projects</link>
		<description><![CDATA[As a long-standing contributor to open standards, and someone trying to become more involved in the open source world (I really need to find an extra ten hours a day!), I am always thinking about these ecosystems, and how they relate to the network engineering world. This article on RedisDB, and in particular this quote, caught my attention. <a href="https://circleid.com/posts20190116_the_need_for_sustainable_open_source_projects">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> BGP Hijacks: Two More Papers Consider the Problem (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20181106_bgp_hijacks_two_more_papers_consider_the_problem</guid>
		<link>https://circleid.com/posts20181106_bgp_hijacks_two_more_papers_consider_the_problem</link>
		<description><![CDATA[The security of the global Default Free Zone (DFZ) has been a topic of much debate and concern for the last twenty years (or more). Two recent papers have brought this issue to the surface once again - it is worth looking at what these two papers add to the mix of what is known, and what solutions might be available. The first of these traces the impact of Chinese "state actor" effects on BGP routing in recent years. <a href="https://circleid.com/posts20181106_bgp_hijacks_two_more_papers_consider_the_problem">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Ossification and Fragmentation: The Once and Future 'net (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20181030_ossification_and_fragmentation_the_once_and_future_net</guid>
		<link>https://circleid.com/posts20181030_ossification_and_fragmentation_the_once_and_future_net</link>
		<description><![CDATA[Mostafa Ammar, out of Georgia Tech recently posted an interesting paper titled The Service-Infrastructure Cycle, Ossification, and the Fragmentation of the Internet. I have argued elsewhere that we are seeing the fragmentation of the global Internet into multiple smaller pieces, primarily based on the centralization of content hosting combined with the rational economic decisions of the large-scale hosting services. The paper in hand takes a slightly different path to reach the same conclusion. <a href="https://circleid.com/posts20181030_ossification_and_fragmentation_the_once_and_future_net">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	
	<item>
		<title> IPv6 Security Considerations (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20181001_ipv6_security_considerations</guid>
		<link>https://circleid.com/posts20181001_ipv6_security_considerations</link>
		<description><![CDATA[When rolling out a new protocol such as IPv6, it is useful to consider the changes to security posture, particularly the network's attack surface. While protocol security discussions are widely available, there is often not "one place" where you can go to get information about potential attacks, references to research about those attacks, potential counters, and operational challenges. <a href="https://circleid.com/posts20181001_ipv6_security_considerations">More...</a>]]></description>
		<dc:date>2026-05-02T08:50:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>