<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>how to eat food</title>
  <id>http://www.howtoeatfood.com/tag/ietf</id>
  <updated>2018-11-21T10:57:28-05:00</updated>
  <author>
    <name>how to eat food</name>
  </author>
  <entry>
    <title>IETF | Herding the DNS Camel</title>
    <link rel="alternate" href="https://ietf.org/blog/herding-dns-camel/"/>
    <id>7cfbf60eb8db0b58b7cdcc45d943a07d</id>
    <published>2018-11-21T10:57:28-05:00</published>
    <updated>2018-11-21T10:57:28-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">IETF | Herding the DNS Camel</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Attacks on Cryptographic Hashes in Internet Protocols</title>
    <link rel="alternate" href="https://www.ietf.org/rfc/rfc4270.txt"/>
    <id>e0d58133a904e040296264a81bdf5887</id>
    <published>2015-12-29T17:29:34-05:00</published>
    <updated>2015-12-29T17:29:34-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Attacks on Cryptographic Hashes in Internet Protocols</summary>
    <content type="html">Recent announcements of better-than-expected collision attacks in
   popular hash algorithms have caused some people to question whether
   common Internet protocols need to be changed, and if so, how.</content>
  </entry>
  <entry>
    <title>Home - A Faster Internet</title>
    <link rel="alternate" href="http://www.afasterinternet.com/"/>
    <id>9bbb25aecf4fe9d4d3c64f94a15b3d71</id>
    <published>2012-12-27T21:04:49-05:00</published>
    <updated>2012-12-27T21:04:49-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Home - A Faster Internet</summary>
    <content type="html">edns client subnet</content>
  </entry>
</feed>
