{"id":11583,"date":"2025-07-15T12:08:04","date_gmt":"2025-07-15T12:08:04","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/11583\/"},"modified":"2025-07-15T12:08:04","modified_gmt":"2025-07-15T12:08:04","slug":"the-internet-still-runs-on-1980s-protocols-that-should-worry-you","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/11583\/","title":{"rendered":"The internet still runs on 1980s protocols \u2013 that should worry you"},"content":{"rendered":"<p>Cloudflare\u2019s 1.1.1.1 DNS resolver service fell victim to a simultaneous BGP hijack and route leak event, causing massive internet outages and degradation worldwide. Pakistan caused the most famous BGP outage. The government tried to block access to <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/tag\/youtube\" data-auto-tag-linker=\"true\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/tag\/youtube\" rel=\"nofollow noopener\" target=\"_blank\">YouTube<\/a> within the country. Their misconfiguration caused a worldwide YouTube outage.<\/p>\n<p>Most organizations are targets of attacks 7.5 times a year. And while most are resolved quickly, these are examples of public infrastructure failures that are beyond your control.<\/p>\n<p>What other technology do you rely on every day that was invented in the 1980s? Not your smartphone. Not your car. Not your TV. And definitely not your work tools. Yet, every time you send an email, connect to a <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/the-best-website-builder\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/the-best-website-builder\" rel=\"nofollow noopener\" target=\"_blank\">website<\/a>, or deploy a cloud service, you\u2019re relying on core internet protocols that predate the web itself.<\/p>\n<p>You may like<\/p>\n<p>Ryo Koyama<\/p>\n<p>Social Links Navigation<\/p>\n<p><a class=\"button-social   \" href=\"https:\/\/www.nobgp.com\/\" target=\"_blank\" aria-label=\"WEBSITE\" rel=\"nofollow noopener\"><\/a><\/p>\n<p>Founder and CEO of noBGP.<\/p>\n<p>The Fragile Foundation<\/p>\n<p>The Border Gateway Protocol (BGP) was designed in 1989, an era when the \u201cinternet\u201d was barely a concept and security was an afterthought. Back then:<\/p>\n<p>&#8211; Home users connected via dial-up modems.<\/p>\n<p>&#8211; Businesses considered themselves cutting-edge if they had a T1 line.<\/p>\n<p>&#8211; Network reliability was a hope, not an expectation.<\/p>\n<p>BGP\u2019s original purpose was simple: keep the nascent internet stitched together. It provided large institutions with a means to announce which <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-ip-address-tools\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-ip-address-tools\" rel=\"nofollow noopener\" target=\"_blank\">IP address<\/a> blocks they controlled and to learn about others. The protocol allowed <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/networking\/routers-storage\/best-router-9-top-wireless-routers-on-test-1090523\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/networking\/routers-storage\/best-router-9-top-wireless-routers-on-test-1090523\" rel=\"nofollow noopener\" target=\"_blank\">routers<\/a> across autonomous systems (ASes) to share route announcements and dynamically discover paths to distant networks.<\/p>\n<p>BGP was designed for resilience, not determinism. For openness, not security.<\/p>\n<p>Speed, uptime, and security<\/p>\n<p>Today, we demand speed, uptime, and security that BGP was never built to deliver. Multi-gigabit fiber reaches homes. Enterprises span multiple clouds across continents. Workloads like real-time video, financial transactions, and machine learning require low-latency, high-throughput data paths.<\/p>\n<p>However, BGP still routes traffic based on trust and reachability, rather than performance or identity. It can\u2019t enforce policies. It can\u2019t prevent hijacks. And it certainly can\u2019t guarantee who\u2019s on the other end.<\/p>\n<p>Despite multiple security incidents and efforts, such as RPKI and BGPsec, the internet still routes traffic based on a chain of trust that can be exploited by anyone with a few malicious route announcements. Most fixes require coordination that doesn\u2019t exist and <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-infrastructure-management-service\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-infrastructure-management-service\" rel=\"nofollow noopener\" target=\"_blank\">IT infrastructure<\/a> upgrades that move at glacial speed.<\/p>\n<p>The result? The modern internet rides on a protocol that thinks it\u2019s still 1992.<\/p>\n<p>Public by Default<\/p>\n<p>Another artifact of that era is the Domain Name System (<a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-dns-server\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-dns-server\" rel=\"nofollow noopener\" target=\"_blank\">DNS<\/a>). Created to make numeric IP addresses human-readable, DNS transformed how people accessed websites. Instead of memorizing strings of numbers, you could simply type in a name.<\/p>\n<p>The problem? DNS is public by design.<\/p>\n<p>Every query, every resolution, and every domain is visible and discoverable. Attackers can enumerate subdomains, discover shadow IT resources, and probe for vulnerabilities \u2013 all by posing as legitimate users.<\/p>\n<p>We\u2019ve seen this pattern before. Consider phone numbers. In the 1990s, receiving a call or piece of mail felt like an event. Now? Most calls are spam, and most email is junk. People don\u2019t pick up unless they recognize the number. Our relationship with public identifiers has undergone a fundamental shift.<\/p>\n<p>The same evolution is happening with network services. Public IP addresses and DNS names are easily scraped, scanned, and attacked. In an age of <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/pro\/best-it-automation-software\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/pro\/best-it-automation-software\" rel=\"nofollow noopener\" target=\"_blank\">automation<\/a> and AI-assisted hacking, exposing your infrastructure by default amounts to sending an invitation.<\/p>\n<p>Yet we continue treating <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-linux-server-distro\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-linux-server-distro\" rel=\"nofollow noopener\" target=\"_blank\">server<\/a> addresses like phone numbers in a white pages directory \u2013 a model that no longer works for the threats we face.<\/p>\n<p>Obsolete Assumptions<\/p>\n<p>Both BGP and DNS reflect assumptions that simply don\u2019t hold up anymore:<\/p>\n<p>&#8211; Assumption: Networks are trusted.<\/p>\n<p>&#8212; Reality: Most attacks now originate from within or via compromised peers.<\/p>\n<p>&#8211; Assumption: Routes are stable.<\/p>\n<p>&#8212; Reality: Internet routes change unpredictably due to performance tuning, outages, and misconfigurations.<\/p>\n<p>&#8211; Assumption: Identities don\u2019t matter.<\/p>\n<p>&#8212; Reality: Zero-trust architecture has become the standard for secure design.<\/p>\n<p>&#8211; Assumption: Services are few and fixed.<\/p>\n<p>&#8212; Reality: Modern architectures dynamically spin up and down thousands of services.<\/p>\n<p>The more we scale and automate, the more these assumptions crumble.<\/p>\n<p>Time for a Rethink<\/p>\n<p>The internet\u2019s early architecture was undeniably brilliant for its time. But that time has passed.<\/p>\n<p>Today\u2019s needs are different. We need:<\/p>\n<p>&#8211; Deterministic data paths that can be trusted end-to-end.<\/p>\n<p>&#8211; Secure naming systems that are private by default.<\/p>\n<p>&#8211; Policy-aware routing that aligns with business, performance, and compliance requirements.<\/p>\n<p>&#8211; A model where services announce themselves securely to authorized peers, not to the entire internet.<\/p>\n<p>These aren\u2019t enhancements; they\u2019re necessities.<\/p>\n<p>The irony is striking: everything else in tech has evolved dramatically. Compute became elastic. Storage turned redundant and distributed. Deployment went fully automated. But networking? It\u2019s still largely manual, primarily public, and built mainly on 40-year-old concepts.<\/p>\n<p>This should be our wake-up call. We can\u2019t keep patching internet <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-internet-security-suites\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-internet-security-suites\" rel=\"nofollow noopener\" target=\"_blank\">security<\/a> with duct tape and hoping for the best. It\u2019s time to challenge the status quo and ask a hard question: are the foundational protocols we depend on every day actually fit for purpose anymore?<\/p>\n<p>Security and <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-linux-distro-privacy-security\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-linux-distro-privacy-security\" rel=\"nofollow noopener\" target=\"_blank\">privacy<\/a> can\u2019t remain afterthoughts we layer onto a crumbling foundation. They need to be built from the ground up. That means completely reimagining how the internet connects, routes, and identifies everything.<\/p>\n<p>Think about it: what other critical system in your life still runs on ideas from the 1980s?<\/p>\n<p>LINK!<\/p>\n<p>This article was produced as part of TechRadarPro&#8217;s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro\" target=\"_blank\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro\" rel=\"nofollow noopener\">https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Cloudflare\u2019s 1.1.1.1 DNS resolver service fell victim to a simultaneous BGP hijack and route leak event, causing massive&hellip;\n","protected":false},"author":2,"featured_media":11584,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43],"tags":[174,74],"class_list":{"0":"post-11583","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-internet","8":"tag-internet","9":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/11583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=11583"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/11583\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/11584"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=11583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=11583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=11583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}