On Friday 07 September 2007 15:26, Florent Daignière wrote: > * Matthew Toseland <[EMAIL PROTECTED]> [2007-09-07 15:22:06]: > > > On Friday 07 September 2007 15:13, you wrote: > > > * Matthew Toseland <[EMAIL PROTECTED]> [2007-09-07 13:49:26]: > > > > > > > Seems to be on a traffic analysis level as it works on encrypted > > bittorrent - > > > > I wonder if this would block Freenet? > > > > > > > > > > http://torrentfreak.com/comcast-throttles-bittorrent-traffic-seeding-impossible/ > > > > > > http://www.dslreports.com/forum/r18323368-Comcast-is-using-Sandvine-to-manage-P2P-Connections > > > > > > > > Thanks to whoever originally sent me this URL! > > > > > > Nothing new as far as I can see ... killing TCP sessions sending out > > > RSTs is what China has been doing for years! > > > > The means of killing them isn't the interesting part. It's the means of > > detecting them that's of interest. > > As far as I know only "transport" is cyphered using RC4 ... access to > the tracker isn't (unless ssl is involved)...
Well it's transport they are interfering with here.. > > by the way preventing seeding when transfert is over is trivial ... flow > analysis ... when you don't download, prevent "uploading". Detect that > it switches from a "symmetrical" pattern to an asymetrical one Exactly, it's traffic flow analysis. Widely deployed, cheap traffic flow analysis hardware kills us.
pgpzVONnx8Qhc.pgp
Description: PGP signature
_______________________________________________ chat mailing list chat@freenetproject.org Archived: http://news.gmane.org/gmane.network.freenet.general Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat Or mailto:[EMAIL PROTECTED]