> From: Bloat <bloat-boun...@lists.bufferbloat.net> on behalf of Jeremy Austin > via Bloat <bloat@lists.bufferbloat.net>
> I'm interested in seeing how one can enforce the 'will of the people' -- the > application vendors (who are doing everything in their power to prevent ISPs > identifying *anything* about the traffic) will certainly not obey such a > will, and the ISP can in good faith implement such a prioritization service > but have no power to cryptographically authenticate such traffic. This seems > a dead end where no one is willing to bear the cost. Great point! Back in the old days, sure you could use DPI to identify flow X as streaming video, flow Y as web traffic, and flow Z as email. No more - based on 3rd party stats somewhere between 90% - 95% of traffic is encrypted (increasing all the time) -- so no more ability to accurately infer application type and trigger a network response based on that. Great doc on the shift to pervasive encryption: https://www.rfc-editor.org/rfc/rfc9446.html "Reflections on Ten Years Past the Snowden Revelations" JL _______________________________________________ Bloat mailing list Bloat@lists.bufferbloat.net https://lists.bufferbloat.net/listinfo/bloat