{"id":24129,"date":"2024-01-11T18:06:04","date_gmt":"2024-01-11T18:06:04","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=24129"},"modified":"2024-01-11T20:24:43","modified_gmt":"2024-01-11T20:24:43","slug":"a-year-in-internet-analysis-2023","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/","title":{"rendered":"A Year in Internet Analysis: 2023"},"content":{"rendered":"\n<p>Por <a href=\"https:\/\/blog.lacnic.net\/en\/author\/doug-madory\">Doug Madory<\/a>&nbsp;\u2013 Director of Internet Analysis at Kentik<\/p>\n\n\n\n<p><em>Originally published in <\/em><a href=\"https:\/\/www.kentik.com\/blog\/a-year-in-internet-analysis-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Kentik Blog<\/em><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>Summary<\/strong><\/h3>\n\n\n\n<p>In this post, Doug Madory reviews the highlights of his wide-ranging internet analysis from the past year, which included covering the state of BGP (both routing leaks and progress in RPKI), submarine cables (both cuts and another historic activation), major outages, and how geopolitics has shaped the internet in 2023.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>It\u2019s the end of another eventful year on the internet, and time for another end-of-year recap of the analysis we\u2019ve published since our <a href=\"https:\/\/www.kentik.com\/blog\/a-year-in-internet-analysis-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">last annual recap<\/a>. This year, we\u2019ve organized the pieces into three broad categories: BGP analysis, outage analysis, and finally, submarine cables and geopolitics. We hope you find this annual summary insightful.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Border Gateway Protocol (BGP) analysis<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"960\" height=\"502\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-doug-brief-history-of-bgp-leaks.webp\" alt=\"\" class=\"wp-image-24095\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-doug-brief-history-of-bgp-leaks.webp 960w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-doug-brief-history-of-bgp-leaks-300x157.webp 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-doug-brief-history-of-bgp-leaks-768x402.webp 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>In June, I published my post, <a href=\"https:\/\/www.kentik.com\/blog\/a-brief-history-of-the-internets-biggest-bgp-incidents\/\" target=\"_blank\" rel=\"noreferrer noopener\">A Brief History of the Internet\u2019s Biggest BGP Incidents<\/a>, which began as a section I wrote for the 2022 <a href=\"https:\/\/www.bitag.org\/index.php\" target=\"_blank\" rel=\"noreferrer noopener\">Broadband Internet Technical Advisory Group (BITAG)<\/a> comprehensive report on <a href=\"https:\/\/www.bitag.org\/Routing_Security.php\" target=\"_blank\" rel=\"noreferrer noopener\">internet routing security<\/a>. The piece began with the AS7007 leak of 1997 and covered the most notable and significant BGP incidents in the history of the internet, from traffic-disrupting BGP leaks to crypto-stealing BGP hijacks. It intended to familiarize the reader with the major events that shape our understanding of the vulnerabilities and weaknesses of BGP.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"960\" height=\"502\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-internet-traffic-rpki-202305.webp\" alt=\"\" class=\"wp-image-24086\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-internet-traffic-rpki-202305.webp 960w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-internet-traffic-rpki-202305-300x157.webp 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-internet-traffic-rpki-202305-768x402.webp 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>In May, my friend Job Snijders of Fastly and I published <a href=\"https:\/\/www.kentik.com\/blog\/exploring-the-latest-rpki-rov-adoption-numbers\/\" target=\"_blank\" rel=\"noreferrer noopener\">updated RPKI ROV adoption numbers<\/a> based on our measurement approach from last year. While the degree to which RPKI-invalids are rejected didn\u2019t change noticeably from the previous year, the number of ROAs created continues to climb. The additional ROAs serve to increase the share of internet traffic eligible for the protection that RPKI ROV offers.<\/p>\n\n\n\n<p>In fact, ROAs are being created at such a clip that the number of globally routed IPv4 BGP routes with ROAs will overtake those without at some point in the next year. IPv6 routes are already there. I\u2019ve posted a survey on <a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7142554453575880704\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a> and <a href=\"https:\/\/twitter.com\/DougMadory\/status\/1735707501750788500\" target=\"_blank\" rel=\"noreferrer noopener\">X\/Twitter<\/a> to gather predictions from my fellow BGP nerds.<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--24129\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/bit.ly\/47ElvfO\">A Brief History of the Internet\u2019s Biggest BGP Incidents<\/a><\/div><\/div><\/section>\n\n\n<p>The above analysis was cited three times by speakers at the FCC\u2019s <a href=\"https:\/\/www.fcc.gov\/news-events\/events\/2023\/07\/bgp-security-workshop\" target=\"_blank\" rel=\"noreferrer noopener\">Border Gateway Protocol Security Workshop<\/a> held on July 31 in Washington D.C. My friend Tony Tauber, Engineering Fellow at Comcast, <a href=\"https:\/\/www.youtube.com\/watch?v=VQhoNX2Q0aM&amp;t=3973s\" target=\"_blank\" rel=\"noreferrer noopener\">cited this analysis<\/a> to argue that traffic data (i.e., NetFlow) suggests that we\u2019re farther along in RPKI ROV adoption than the raw counts of BGP routes might suggest. Another friend of mine, Nimrod Levy of AT&amp;T, <a href=\"https:\/\/www.youtube.com\/watch?v=VQhoNX2Q0aM&amp;t=4332s\" target=\"_blank\" rel=\"noreferrer noopener\">cited our observation<\/a> that a route that is evaluated as RPKI-invalid will have its propagation reduced by 50% or more.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"547\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/nist-slide-1024x547.webp\" alt=\"\" class=\"wp-image-24113\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/nist-slide-1024x547.webp 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/nist-slide-300x160.webp 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/nist-slide-768x410.webp 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/nist-slide.webp 1360w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Slide from Doug Montgomery of NIST, including the pie chart above in a slide at the workshop.<\/p>\n\n\n\n<p>In addition, I dug into a couple of BGP leak incidents this year. At the beginning of the year, I used <a href=\"https:\/\/www.kentik.com\/blog\/new-year-new-bgp-leaks\/\" target=\"_blank\" rel=\"noreferrer noopener\">two route leaks<\/a> to explore the impacts on traffic using our extensive NetFlow data. A common concern with a routing leak is the misdirection of traffic through a suboptimal path, but the other, often greater impact, is how much traffic is simply dropped due to congested links or high latencies.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"547\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/leaks-by-status-1024x547.webp\" alt=\"\" class=\"wp-image-24110\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/leaks-by-status-1024x547.webp 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/leaks-by-status-300x160.webp 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/leaks-by-status-768x410.webp 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/leaks-by-status-1536x821.webp 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/leaks-by-status.webp 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Propagation analysis from <a href=\"https:\/\/www.kentik.com\/blog\/a-tale-of-two-bgp-leaks\/\" target=\"_blank\" rel=\"noreferrer noopener\">A Tale of Two BGP Leaks<\/a> post<\/p>\n\n\n\n<p>In other incidents, I analyzed the role of RPKI ROV in limiting the disruption caused by leaks. For example, in August, the government of <a href=\"https:\/\/www.kentik.com\/blog\/iraq-blocks-telegram-leaks-blackhole-bgp-routes\/\" target=\"_blank\" rel=\"noreferrer noopener\">Iraq attempted to block Telegram<\/a> by announcing a BGP hijack within the country. The route leaked out but didn\u2019t propagate very far because Telegram had a ROA for the IP space and the international carriers serving Iraq rejected the RPKI-invalid BGP hijack from propagating outside the country, limiting the disruption of Telegram.<\/p>\n\n\n\n<p>In that post, I concluded that \u201cwhile it likely didn\u2019t have the potential to be another Pakistan\/YouTube incident, BGP <em>non-events<\/em> like this are what RPKI successes look like.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Outage analysis<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Azure<\/h3>\n\n\n\n<p>As with any year, there were many internet service outages of various types, but the two that I spent time digging into were the <a href=\"https:\/\/www.kentik.com\/blog\/digging-into-the-optus-outage\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure connectivity outage in January<\/a> and the <a href=\"https:\/\/www.kentik.com\/blog\/digging-into-the-optus-outage\/\">Optus outage in Australia<\/a> at the end of the year.<\/p>\n\n\n\n<p>In the early hours of Wednesday, January 25, Microsoft\u2019s public cloud suffered a major outage that disrupted their cloud-based services and popular applications such as Sharepoint, Teams, and Office 365. Similar to the historic <a href=\"https:\/\/www.kentik.com\/blog\/facebooks-historic-outage-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook outage of October 2021<\/a>, Microsoft blamed the outage on a flawed router command, which took down a significant portion of the cloud\u2019s connectivity.<\/p>\n\n\n\n<p>In my post, I analyzed the outage using a variety of unique datasets from Kentik, including our BGP visualizations, performance monitoring, and aggregate NetFlow analysis.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"711\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/seattle-se-asia-disconnect-1024x711.webp\" alt=\"\" class=\"wp-image-24116\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/seattle-se-asia-disconnect-1024x711.webp 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/seattle-se-asia-disconnect-300x208.webp 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/seattle-se-asia-disconnect-768x533.webp 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/seattle-se-asia-disconnect-1536x1067.webp 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/seattle-se-asia-disconnect.webp 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In the end, it was hard to explain why some parts of Azure\u2019s connectivity were impacted while others were not without intimate knowledge of their architecture, but we could surmise that Azure\u2019s loss of connectivity varied greatly depending on the source and destination.<\/p>\n\n\n\n<p>A curious detail of this outage is that it surfaced BGP routes that purportedly showed Microsoft hijacking Saudi Telecom, T-Mobile, the US Department of Defense, among other entities. After a lengthy email exchange involving numerous engineers from Microsoft, Vocus, TPG and myself concerning the hijacks, they <a href=\"https:\/\/twitter.com\/DougMadory\/status\/1622636431230238738\" target=\"_blank\" rel=\"noreferrer noopener\">disappeared from the global routing table<\/a> without further explanation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Optus<\/h3>\n\n\n\n<p>The Optus outage in November was arguably much more impactful than the Azure glitch, and I looked into it in a post entitled <a href=\"https:\/\/www.kentik.com\/blog\/digging-into-the-optus-outage\/\" target=\"_blank\" rel=\"noreferrer noopener\">Digging into the Optus Outage<\/a>:<\/p>\n\n\n\n<p>In the early hours of Wednesday, November 8, Australians woke up to find one of their major telecoms completely down. Internet and mobile provider Optus had suffered a catastrophic outage beginning at 17:04 UTC on November 7, or 4:04 am the following day in Sydney. It wouldn\u2019t fully recover until hours later, leaving millions of Australians without telephone and internet connectivity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"510\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/internet-outage-restoration-phases-1024x510.webp\" alt=\"\" class=\"wp-image-24119\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/internet-outage-restoration-phases-1024x510.webp 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/internet-outage-restoration-phases-300x149.webp 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/internet-outage-restoration-phases-768x383.webp 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/internet-outage-restoration-phases-1536x765.webp 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/internet-outage-restoration-phases.webp 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In the post, I described how the Optus outage was similar to the <a href=\"https:\/\/www.kentik.com\/blog\/a-deeper-dive-into-the-rogers-outage\/\" target=\"_blank\" rel=\"noreferrer noopener\">Rogers outage of July 2022<\/a>. In both cases, a portion of the networks\u2019 BGP routes were withdrawn, but those withdrawals were merely symptoms of an internal issue, rather than the cause of the outage.<\/p>\n\n\n\n<p>The Rogers outage was caused by the removal of a route filter, which leaked the global routing table into the internal routing, overwhelming their routers and bringing the network down. In the Optus outage, a sibling network (also owned by parent company Singtel) leaked routes into Optus\u2019s network. The leak triggered the <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/border-gateway-protocol-bgp\/25160-bgp-maximum-prefix.html\" target=\"_blank\" rel=\"noreferrer noopener\">MAXPREF safeguard<\/a> on Optus\u2019s routers. MAXPREF instructs routers to tear down a session when the number of routes advertised across it exceeds a specified maximum number.<\/p>\n\n\n\n<p>Unfortunately, the default retry time for Cisco routers is <a href=\"https:\/\/twitter.com\/jaredmauch\/status\/1724410843125744002\" target=\"_blank\" rel=\"noreferrer noopener\">\u2018forever,\u2019<\/a> meaning that an engineer would need to manually intervene on each router to re-establish lost sessions. A safer practice is to set a retry time for the router to automatically re-establish the session after a minute when the routing leak has passed.<\/p>\n\n\n\n<p>The outage led to the <a href=\"https:\/\/www.studiesinaustralia.com\/Blog\/about-australia\/the-modern-guide-to-aussie-slang#:~:text=Brekky%3A%20the%20first%20and%20most,Aussies%20call%20breakfast%20'brekky'.\" target=\"_blank\" rel=\"noreferrer noopener\">resignation of the CEO<\/a> and the minting of a new internet star, <a href=\"https:\/\/www.dailymail.co.uk\/news\/article-12727421\/Optus-outage-cat-Sydney.html\" target=\"_blank\" rel=\"noreferrer noopener\">Luna the cat<\/a> whose <a href=\"https:\/\/www.studiesinaustralia.com\/Blog\/about-australia\/the-modern-guide-to-aussie-slang#:~:text=Brekky%3A%20the%20first%20and%20most,Aussies%20call%20breakfast%20'brekky'.\">brekkie<\/a> was another casualty of the outage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Submarine cables and geopolitics<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"960\" height=\"502\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-cuba-submarine-cable.webp\" alt=\"\" class=\"wp-image-24092\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-cuba-submarine-cable.webp 960w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-cuba-submarine-cable-300x157.webp 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-cuba-submarine-cable-768x402.webp 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>In January, we celebrated the 10th anniversary of the <a href=\"https:\/\/www.reuters.com\/article\/cuba-internet\/cubas-mystery-fiber-optic-internet-cable-stirs-to-life-idUKL1N0AR9TQ20130122\/\" target=\"_blank\" rel=\"noreferrer noopener\">activation of the ALBA-1 submarine cable<\/a> to Cuba. However, just a month earlier, the US Department of Justice <a href=\"https:\/\/www.justice.gov\/opa\/press-release\/file\/1554426\/download\" target=\"_blank\" rel=\"noreferrer noopener\">recommended<\/a> that the FCC deny the request by the <a href=\"https:\/\/www.submarinecablemap.com\/submarine-cable\/arcos\" target=\"_blank\" rel=\"noreferrer noopener\">ARCOS submarine cable<\/a> to build a spur connecting Cuba to the cable system.<\/p>\n\n\n\n<p>As I wrote in my <a href=\"https:\/\/www.kentik.com\/blog\/cuba-and-the-geopolitics-of-submarine-cables\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post in January<\/a>, the rejection of an ARCOS landing in Cuba showed that, almost a decade after the activation of the ALBA-1 cable, geopolitics continues to shape the physical internet \u2014 especially when it comes to Cuba.<\/p>\n\n\n\n<p>A large part of the rationale for denying ARCOS a landing in Cuba was the possibility that ETECSA, the state telecom of Cuba, could employ BGP hijacks to intercept US traffic. Of course, nothing stops ETECSA from trying that now and the addition of a submarine cable doesn\u2019t alter this risk, in my opinion.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-congo-canyon-1024x535.png\" alt=\"\" class=\"wp-image-24083\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-congo-canyon-1024x535.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-congo-canyon-300x157.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-congo-canyon-768x401.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-congo-canyon.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In August, an undersea landslide in one of the world\u2019s longest submarine canyons knocked out two of the most important submarine cables serving the African internet. The loss of these cables knocked out international internet bandwidth along the west coast of Africa.<\/p>\n\n\n\n<p>In my <a href=\"https:\/\/www.kentik.com\/blog\/dual-subsea-cable-cuts-disrupt-african-internet\/\" target=\"_blank\" rel=\"noreferrer noopener\">post on the cable cuts<\/a>, I reviewed some history of the impact of undersea landslides on submarine cables and concluded, \u201cMake no mistake; the seafloor can be a dangerous place for cables.\u201d I used some of Kentik\u2019s unique data sets to explore the impacts of these cable breaks, which I later <a href=\"https:\/\/www.youtube.com\/watch?v=mNinsrz9FmE\" target=\"_blank\" rel=\"noreferrer noopener\">remotely presented<\/a> at Angola NOG (AONOG) in November.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-napoleon-traffic-1024x535.png\" alt=\"\" class=\"wp-image-24089\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-napoleon-traffic-1024x535.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-napoleon-traffic-300x157.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-napoleon-traffic-768x401.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/feature-napoleon-traffic.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>It is rare that we get to celebrate a new submarine cable activation like the one that occurred on October 1 in Saint Helena. In <a href=\"https:\/\/www.kentik.com\/blog\/ending-saint-helenas-exile-from-the-internet\/\" target=\"_blank\" rel=\"noreferrer noopener\">my blog post<\/a>, I published the first evidence of the activation of the submarine cable connection to the remote British overseas territory and the final place of exile for Napoleon Bonaparte.<\/p>\n\n\n\n<p>In the post, I went on to tell the epic story (more <a href=\"https:\/\/variety.com\/2023\/film\/news\/napoleon-inaccuracies-french-historians-pyramids-1235823975\/\" target=\"_blank\" rel=\"noreferrer noopener\">historically accurate<\/a> than the recent Napoleon movie) of the advocacy work by my friend German telecommunications expert Christian von der Ropp to make this cable activation a reality:<\/p>\n\n\n\n<p>Realizing that landing a submarine cable branch in Saint Helena wasn\u2019t going to happen without dedicated advocacy, Christian founded the non-profit Connect St Helena in early 2012 and began the lobbying effort.<\/p>\n\n\n\n<p>After being rebuffed by the government of the UK, Saint Helena ultimately received funding from the EU to build a spur to Google\u2019s upcoming <a href=\"https:\/\/www.submarinecablemap.com\/submarine-cable\/equiano\" target=\"_blank\" rel=\"noreferrer noopener\">Equiano submarine cable<\/a>.<\/p>\n\n\n\n<p>While the UK had voted to leave the EU in 2016, the implementation of \u201cBrexit\u201d wasn\u2019t finalized until February 2020. In 2018, the (Saint Helena Government) was still eligible to receive EU funding. It would be one of the last EU benefits given to the UK.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-russification-1024x535.png\" alt=\"\" class=\"wp-image-24101\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-russification-1024x535.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-russification-300x157.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-russification-768x401.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-russification.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Finally, the conflict in Ukraine continues to rage on, impacting internet connectivity in war-ravaged parts of the country. I wrote two pieces of analysis early in the year focused on the situation in Ukraine.<\/p>\n\n\n\n<p>The first focused on the <a href=\"https:\/\/www.kentik.com\/blog\/the-russification-of-ukrainian-ip-registration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Russification of Ukrainian IP addresses in RIPE registrations<\/a>. Ukrainian residents of Russian-held regions have been forced to adopt all things Russian: language, currency, telephone numbers, and, of course, internet service.<\/p>\n\n\n\n<p>Using a novel utility made available by RIPE NCC, I identified dozens of changes to RIPE registrations, revealing another target of this Russification effort: the geolocation of Ukrainian IP addresses.<\/p>\n\n\n\n<p>An example of the output of the historical RIPE whois query is below:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ whois --diff-versions 9:10  178.158.128.0 - 178.158.191.255\n\n% Difference between version 9 and 10 of object \"178.158.128.0 - 178.158.191.255\"\n\n@@ -2,3 +2,3 @@\n netname:        ISP-EAST-NET\n-country:        UA\n+country:        RU\n org:            ORG-EL88-RIPE\n@@ -10,3 +10,3 @@\n created:        2010-11-18T10:59:18Z\n-last-modified:  2016-04-14T10:43:56Z\n+last-modified:  2022-07-21T12:58:43Z\n source:         RIPE<\/code><\/pre>\n\n\n\n<p>The <a href=\"https:\/\/www.kentik.com\/blog\/ukraines-wartime-internet-from-the-inside\/\" target=\"_blank\" rel=\"noreferrer noopener\">second post<\/a> was a collaboration with the <a href=\"https:\/\/www.wsj.com\/articles\/ukrainians-work-through-blackouts-internet-outages-as-russia-targets-power-grid-218a0fd5\" target=\"_blank\" rel=\"noreferrer noopener\">Wall Street Journal<\/a> and used a novel data source that allowed us to explore connectivity inside Ukraine: the <a href=\"https:\/\/www.caida.org\/projects\/ark\/\" target=\"_blank\" rel=\"noreferrer noopener\">ARK dataset<\/a> from the <a href=\"https:\/\/www.caida.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Center for Applied Internet Data Analysis (CAIDA)<\/a>.<\/p>\n\n\n\n<p>Expanding on our <a href=\"https:\/\/www.kentik.com\/blog\/rerouting-of-kherson-follows-familiar-gameplan\/\" target=\"_blank\" rel=\"noreferrer noopener\">collaborative work<\/a> with the <a href=\"https:\/\/www.nytimes.com\/interactive\/2022\/08\/09\/technology\/ukraine-internet-russia-censorship.html\" target=\"_blank\" rel=\"noreferrer noopener\">New York Times<\/a> in the previous year, we explored how the war changed the path of traffic traversing the domestic Ukrainian internet. In the graphic below, we employed traceroutes from the ARK measurement server in Kyiv to various ISPs in the Kherson region over the course of a year.<\/p>\n\n\n\n<p>There is a clear point when the latencies increase due to the Russian rerouting at the beginning of June 2022. The graphic also illustrates the result of the Ukrainian liberation effort in Kherson. Ukrainians recaptured half of the region, and we see a portion of the traceroutes reverting to a lower latency as those networks restore their Ukrainian transit connections. A few providers in the region of Kherson are still on Russian transit, presumably in the territory that is still under Russian control.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-kentik-analysis-wsj-1024x535.png\" alt=\"\" class=\"wp-image-24098\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-kentik-analysis-wsj-1024x535.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-kentik-analysis-wsj-300x157.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-kentik-analysis-wsj-768x401.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/featured-kentik-analysis-wsj.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Lastly, I joined a team of researchers led by the <a href=\"https:\/\/censoredplanet.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Censored Planet<\/a> group at the University of Michigan to author a paper presented this summer at the <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity23\" target=\"_blank\" rel=\"noreferrer noopener\">32rd Usenix Security Symposium<\/a> entitled, <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/ramesh-network-responses\" target=\"_blank\" rel=\"noreferrer noopener\">Network Responses to Russia\u2019s Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom<\/a>. My portion covered the Russian <a href=\"https:\/\/twitter.com\/DougMadory\/status\/1508466367112093709\" target=\"_blank\" rel=\"noreferrer noopener\">BGP hijack of Twitter<\/a> and a video of the presentation is <a href=\"https:\/\/www.youtube.com\/watch?v=kBK3N3dYZq4\" target=\"_blank\" rel=\"noreferrer noopener\">available here<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Kentik provides network observability to hundreds of the most important service providers and enterprises in the world. As a result, it provides me, an internet measurement analyst, unparalleled data and tools to conduct analysis of important internet developments.<\/p>\n\n\n\n<p>As we look ahead to the new year, there is no shortage of challenges and opportunities for internet connectivity around the world. We intend to continue producing timely, informative, and impactful analysis that helps inform the public and industry about internet connectivity issues.<\/p>\n\n\n\n<p>Follow <a href=\"https:\/\/twitter.com\/DougMadory\" target=\"_blank\" rel=\"noreferrer noopener\">me on X\/Twitter<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/kentik\/mycompany\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kentik on LinkedIn<\/a> to make sure you get notified as we publish posts in the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Por Doug Madory&nbsp;\u2013 Director of Internet Analysis at Kentik Originally published in Kentik Blog Summary In this post, Doug Madory reviews the highlights of his wide-ranging internet analysis from the past year, which included covering the state of BGP (both routing leaks and progress in RPKI), submarine cables (both cuts and another historic activation), major [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":24104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1327],"tags":[1292,1372],"archivo":[1345,1451],"taxonomy-authors":[1418],"tipo_autor":[1455],"class_list":["post-24129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interconnection","tag-interconnection","tag-internet-measurements","archivo-editions","archivo-highlights-2023","taxonomy-authors-doug-madory-en","tipo_autor-colaborador"],"acf":{"author":"Doug Madory \u2013 Director of Internet Analysis at Kentik","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | A Year in Internet Analysis: 2023<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | A Year in Internet Analysis: 2023\" \/>\n<meta property=\"og:description\" content=\"Por Doug Madory&nbsp;\u2013 Director of Internet Analysis at Kentik Originally published in Kentik Blog Summary In this post, Doug Madory reviews the highlights of his wide-ranging internet analysis from the past year, which included covering the state of BGP (both routing leaks and progress in RPKI), submarine cables (both cuts and another historic activation), major [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-11T18:06:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-11T20:24:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"A Year in Internet Analysis: 2023\",\"datePublished\":\"2024-01-11T18:06:04+00:00\",\"dateModified\":\"2024-01-11T20:24:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/\"},\"wordCount\":2075,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png\",\"keywords\":[\"Interconnection\",\"Internet Measurements\"],\"articleSection\":[\"Interconnection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/\",\"name\":\"LACNIC Blog | A Year in Internet Analysis: 2023\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png\",\"datePublished\":\"2024-01-11T18:06:04+00:00\",\"dateModified\":\"2024-01-11T20:24:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Year in Internet Analysis: 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | A Year in Internet Analysis: 2023","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | A Year in Internet Analysis: 2023","og_description":"Por Doug Madory&nbsp;\u2013 Director of Internet Analysis at Kentik Originally published in Kentik Blog Summary In this post, Doug Madory reviews the highlights of his wide-ranging internet analysis from the past year, which included covering the state of BGP (both routing leaks and progress in RPKI), submarine cables (both cuts and another historic activation), major [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-01-11T18:06:04+00:00","article_modified_time":"2024-01-11T20:24:43+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"A Year in Internet Analysis: 2023","datePublished":"2024-01-11T18:06:04+00:00","dateModified":"2024-01-11T20:24:43+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/"},"wordCount":2075,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png","keywords":["Interconnection","Internet Measurements"],"articleSection":["Interconnection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/","url":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/","name":"LACNIC Blog | A Year in Internet Analysis: 2023","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png","datePublished":"2024-01-11T18:06:04+00:00","dateModified":"2024-01-11T20:24:43+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/a-year-in-internet-analysis-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"A Year in Internet Analysis: 2023"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/interconexion-2024.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":24080,"post_title":"An\u00e1lisis de Internet del 2023","slug":"analisis-de-internet-del-2023","href":"https:\/\/blog.lacnic.net\/analisis-de-internet-del-2023\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/24129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=24129"}],"version-history":[{"count":5,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/24129\/revisions"}],"predecessor-version":[{"id":24143,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/24129\/revisions\/24143"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/24104"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=24129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=24129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=24129"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=24129"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=24129"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=24129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}