> From: Bloat <bloat-boun...@lists.bufferbloat.net> on behalf of Jeremy Austin 
> via Bloat <bloat@lists.bufferbloat.net>

> I'm interested in seeing how one can enforce the 'will of the people' -- the 
> application vendors (who are doing everything in their power to prevent ISPs 
> identifying *anything* about the traffic) will certainly not obey such a 
> will, and the ISP can in good faith implement such a prioritization service 
> but have no power to cryptographically authenticate such traffic. This seems 
> a dead end where no one is willing to bear the cost.

Great point! Back in the old days, sure you could use DPI to identify flow X as 
streaming video, flow Y as web traffic, and flow Z as email. No more - based on 
3rd party stats somewhere between 90% - 95% of traffic is encrypted (increasing 
all the time) -- so no more ability to accurately infer application type and 
trigger a network response based on that. 

Great doc on the shift to pervasive encryption: 
https://www.rfc-editor.org/rfc/rfc9446.html "Reflections on Ten Years Past the 
Snowden Revelations"

JL 





_______________________________________________
Bloat mailing list
Bloat@lists.bufferbloat.net
https://lists.bufferbloat.net/listinfo/bloat

Reply via email to