๐Ÿ›ก๏ธStalecollected in 8h

Radar Tools for Security Transparency

Radar Tools for Security Transparency
PostLinkedIn
๐Ÿ›ก๏ธRead original on Cloudflare Blog

๐Ÿ’กTrack PQ crypto & routing security shifts for secure AI infra

โšก 30-Second TL;DR

What Changed

New monitoring for post-quantum (PQ) crypto usage

Why It Matters

Enables AI infra teams to track crypto migrations, ensuring future-proof security.

What To Do Next

Use Cloudflare Radar to monitor PQ adoption in your AI deployments.

Who should care:Enterprise & Security Teams

๐Ÿง  Deep Insight

Web-grounded analysis with 10 cited sources.

๐Ÿ”‘ Enhanced Key Takeaways

  • โ€ขCloudflare Radar's origin post-quantum support graph shows the share of customer origins supporting X25519MLKEM768 hybrid key exchange, with data accessible via Radar API.[1]
  • โ€ขThe Key Transparency dashboard on Radar displays real-time verification status of KT logs for services like WhatsApp, indicating last signed and verified times by Cloudflare's Auditor.[1]
  • โ€ขASPA monitoring on Radar tracks adoption trends across five Regional Internet Registries (RIRs) and displays AS-level ASPA records and changes over time.[6]
  • โ€ขCloudflare secures 52% of all human web traffic with post-quantum encryption, as reported in their sixth annual Year in Review using Radar data.[4]

๐Ÿ› ๏ธ Technical Deep Dive

  • โ€ขPost-quantum monitoring extends to origin-facing connections using X25519MLKEM768, a hybrid of classical X25519 and NIST-standardized ML-KEM lattice-based scheme.[1]
  • โ€ขKey Transparency logs enable public verification of end-to-end encrypted messaging, with Radar dashboard showing real-time Auditor signatures.[1]
  • โ€ขASPA (Autonomous System Provider Authorization) cryptographically validates BGP routing paths to prevent route leaks, monitored at RIR and AS levels.[6]
  • โ€ขCloudflare IPsec supports post-quantum hybrid ML-KEM per IETF draft extending RFC 9370 for IKEv2, enabling parallel key exchange with classical Diffie-Hellman.[5]

๐Ÿ”ฎ Future ImplicationsAI analysis grounded in cited sources

Cloudflare Radar will exceed 70% global post-quantum client adoption by end of 2026
Client support grew from under 3% in early 2024 to over 60% by February 2026, driven by browser and library defaults.[1]
ASPA adoption will reach majority of Regional Internet Registries by 2027
Radar tracks accelerating rollout to prevent BGP route leaks, with new monitoring enabling community-wide visibility.[6]
Harvest-now-decrypt-later attacks will decline 50% on Cloudflare networks post-2026
Full SASE platform including IPsec now uses quantum-resistant ML-KEM, protecting against data collection for future quantum decryption.[2][5]

โณ Timeline

2017
Cloudflare research team begins post-quantum encryption development.
2020
Cloudflare Radar launches, providing initial internet observability tools.
2023-01
Announces post-quantum encryption inclusion in delivery services, free for all.
2024-04
Radar begins tracking client-side post-quantum encryption adoption from under 3%.
2025-10
Adds browser support checking for X25519MLKEM768 hybrid key exchange on Radar.
2026-02
Launches origin PQ monitoring, KT logs dashboard, and ASPA tracking on Radar.
๐Ÿ“ฐ

Weekly AI Recap

Read this week's curated digest of top AI events โ†’

๐Ÿ‘‰Related Updates

AI-curated news aggregator. All content rights belong to original publishers.
Original source: Cloudflare Blog โ†—