Another bunch of slides with no context. Is there an accompanying video to go with these, or can we gleen solid info from this?<p>My takeaway from this is that DNSSEC is done wrong from the outset here, and hence all these vectors are possible. The vectors don't seem particularly nasty if we verify the integrity of DNS from the get go.