On Wednesday 15 March 2006 12:50, Alex Robar wrote: > torrent encryption works. That way when someone like Shaw decides they > don't like VoIP traffic, it won't matter, because they'll never be able > to identify it.
Until Shaw decides to simply do the opposite: classify everything as "bulk" except for packets they can identify. Simply tagging HTTP/HTTPS and SMTP/POP3/IMAP4 will suffice to keep the vast majority of their customers happy, which is all they care about anyway. ... and then of course we'll modify the P2P/VOIP stuff to look like HTTP/HTTPS traffic and they'll respond by silently proxying everything. ... and then we'll modify P2P/VOIP to work through most proxies.... with crappy performance/quality. It's a constant back-and-forth. I'd prefer to make these protocols so ubiquitous (hope I spelled that right) that it becomes suicidal for a business to decide to screw with them. -A.
