Subscribe to receive notifications of new posts:

So long, and thanks for all the fish: how to escape the Linux networking stack

2025-10-29

ResearchLinuxEgress

Many products at Cloudflare aren’t possible without pushing the limits of network hardware and software to deliver improved performance, increased efficiency, or novel capabilities such as soft-unicast, our method for sharing IP subnets across data centers. Happily, most people do not need to know the intricacies of how your operating system handles network and Internet access in general. Yes, even most people within Cloudflare. But sometimes we try to push well beyond the design intentions of Linux’s networking stack. This is a story about one of those attempts....

State of the post-quantum Internet in 2025

2025-10-28

ResearchPost-Quantum

Today over half of human-initiated traffic with Cloudflare is protected against harvest-now/decrypt-later with post-quantum encryption. What once was a cool science project, is the new security baseline for the Internet. We’re not done yet: in this blog post we’ll take measure where we are, what we expect for the coming years, and what you can do today....

How Cloudflare’s client-side security made the npm supply chain attack a non-event

2025-10-24

Supply Chain AttacksJavaScriptMalicious JavaScriptAIDeveloper PlatformDevelopers

A recent npm supply chain attack compromised 18 popular packages. This post explains how Cloudflare’s graph-based machine learning model, which analyzes 3.5 billion scripts daily, was built to detect and block exactly this kind of threat automatically....