ISP routinely re-allocate broadband connections. usually at scheduled times. 3
hour intervals? 12, 24?
i know it happens cuse it was breaking my software.
the IT guys arn't that sophisticated, though I think many vendors firmware is
probably not that great.
I think everyone is spied on, but the NSA taps the lines directly.
lemon
Charles Iliya Krempeaux <[EMAIL PROTECTED]> wrote:
Hmmm... maybe that's why my SSH connections from home always constantly get
expectantly shutdown.
Maybe people should be hiding things out in the open. Like, make it look like
normal (unencrypted) HTTP, SMTP, or POP3 traffic (or something pretty common
like those)... and hide the data in the data stream.
For instance... make it look like an image is being downloaded... and hide data
in there... etc.
See ya
On 9/19/07, Roop Mukherjee < [EMAIL PROTECTED]> wrote: Apparently ISPs are
degrading service to p2p traffic and everything
encrypted for their users.
http://it.slashdot.org/article.pl?sid=07/04/07/1755230
1. Does anyone know what packet inspection algorithms are being used for
ISPs for finding p2p traffic? Given the variety of p2p protocols in use
and the frequency at which they change I would guess that a port based or bit
pattern based filers would not be totally effective.
2. Are their ways that p2p data that uses ssh can be distinguished from
say an e-commerce transaction by an ISP?
-- Roop
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers
--
Charles Iliya Krempeaux, B.Sc. < http://ChangeLog.ca/>
Vlog Razor... Vlogging News
http://vlograzor.com/
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers
You don't get no juice unless you squeeze
Lemon Obrien, the Third.
http://www.tamago.us_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers