- “방심하면 당한다” 최악의 AI 대실패 사례 12선
- Qualcomm’s $2.4B Alphawave deal signals bold data center ambitions
- Is this the end of Intel-based Macs? Apple confirms bittersweet update policy for MacOS
- Your Apple MacBook is getting a free upgrade - here are the best MacOS 26 features
- “고객 53%에겐 독이 됐다”···가트너가 경고한 ‘수동적 개인화’ 마케팅의 역설
Open MPIC project defends against BGP attacks on certificate validation

Traditional validation methods rely on DNS lookups, HTTP challenges or email verification, all of which depend on proper internet routing. BGP’s inherent lack of security controls creates the opportunity for traffic hijacking.
“When a CA performs a domain control check, it assumes the traffic it sends is reaching the right server,” Sharkov said. “But that’s not always true.”
The consequences are significant: Fraudulently obtained certificates enable convincing website impersonation and potential encrypted traffic interception.
How Open MPIC works
The Open MPIC framework implements a straightforward but effective security principle: Check the same validation data from multiple disparate locations on the internet.
“The fix is to make certificate validation less reliant on any one route,” Sharkov explained. “Instead of validating a domain from a single network location, MPIC requires CAs to check from multiple, geographically diverse vantage points.”
This approach increases the work required for successful attacks, as an attacker would need to simultaneously compromise routing to multiple geographically diverse vantage points. As such, if one region gets misled by a BGP hijack, others can catch the discrepancy and stop the certificate from being issued.