On Wednesday 15 March 2006 12:50, Alex Robar wrote:
> torrent encryption works. That way when someone like Shaw decides they
> don't like VoIP traffic, it won't matter, because they'll never be able
> to identify it.

Until Shaw decides to simply do the opposite: classify everything as "bulk" 
except for packets they can identify.  Simply tagging HTTP/HTTPS and 
SMTP/POP3/IMAP4 will suffice to keep the vast majority of their customers 
happy, which is all they care about anyway.

... and then of course we'll modify the P2P/VOIP stuff to look like HTTP/HTTPS 
traffic and they'll respond by silently proxying everything.

... and then we'll modify P2P/VOIP to work through most proxies....  with 
crappy performance/quality.  It's a constant back-and-forth.  I'd prefer to 
make these protocols so ubiquitous (hope I spelled that right) that it 
becomes suicidal for a business to decide to screw with them.

-A.

Reply via email to