Fireship | The Internet's most broken protocol @Fireship | Uploaded 1 month ago | Updated 2 hours ago
Try Brilliant free for 30 days brilliant.org/fireship Youβll also get 20% off an annual premium subscription
The White House recently unveiled a plan to deal with networking weaknesses in the Border Gateway Protocol. In the past, the BGP has been exploited or misconfigured to cause massive disruptions on the Internet.
#hacking #tech #thecodereport
π¬ Chat with Me on Discord
discord.gg/fireship
π Resources
BGP roadmap whitehouse.gov/oncd/briefing-room/2024/09/03/fact-sheet-biden-harris-administration-releases-roadmap-to-enhance-internet-routing-security
CrowdStrike Disaster youtu.be/H9RSeDUdkCA
Rabbit R1 Hack youtu.be/lkbV8oP-F44
π₯ Get More Content - Upgrade to PRO
Upgrade at fireship.io/pro
Use code YT25 for 25% off PRO access
π¨ My Editor Settings
- Atom One Dark
- vscode-icons
- Fira Code Font
π Topics Covered
- Biggest Internet outages in history
- What is the Border Gateway Protocol?
- Major weaknesses on the internet
- How are networks kept secure?
- Cryptographic security in networking
Try Brilliant free for 30 days brilliant.org/fireship Youβll also get 20% off an annual premium subscription
The White House recently unveiled a plan to deal with networking weaknesses in the Border Gateway Protocol. In the past, the BGP has been exploited or misconfigured to cause massive disruptions on the Internet.
#hacking #tech #thecodereport
π¬ Chat with Me on Discord
discord.gg/fireship
π Resources
BGP roadmap whitehouse.gov/oncd/briefing-room/2024/09/03/fact-sheet-biden-harris-administration-releases-roadmap-to-enhance-internet-routing-security
CrowdStrike Disaster youtu.be/H9RSeDUdkCA
Rabbit R1 Hack youtu.be/lkbV8oP-F44
π₯ Get More Content - Upgrade to PRO
Upgrade at fireship.io/pro
Use code YT25 for 25% off PRO access
π¨ My Editor Settings
- Atom One Dark
- vscode-icons
- Fira Code Font
π Topics Covered
- Biggest Internet outages in history
- What is the Border Gateway Protocol?
- Major weaknesses on the internet
- How are networks kept secure?
- Cryptographic security in networking