2 years ago, when we started studying how DNS records could be used to discover malicious activity, we needed a way to quickly access current and historical data.

3rd party solutions were too slow and too limited to implement Kopis, the very first model we wanted to try.

The logs collected by ...