The Tinker’s Bench¶
Where theory gets its fingers dirty.
- Rootways of the World Tree (@Internet)
- Compromised customer → false‑origin prefix hijack
- Route leak escalating into an effective hijack
- Legitimate peering → more‑specific prefix hijack
- Incomplete RPKI deployment → opportunistic prefix hijack
- Policy trust abuse → preferred‑path hijack
- Strategic traffic interception via stealthy prefix hijack
- Path manipulation for selective degradation and coercion
- Route legitimacy subversion and long‑term positioning
- Narrative shaping via deniable routing disruption