RIPE NCC RPKI exploit chain
The article discusses a chain of exploitation related to RIPE NCC's RPKI, illustrating how weaknesses in the RPKI deployment could be exploited in practice. It emphasizes the implications for routing security and the need for operators to review their RPKI/ROA configurations. A link to community comments is provided.