I was looking around for more information on 'Man in the Middle' attacks (which is in effect what Phorm are doing with the cookies) and DPI equipment and came across this rather interesting article from last July;
http://arstechnica.com/articles/cult...neutrality.ars
It gives a good outline of what DPI equipment can do but also got me wondering what equipment VM use for traffic shaping, anyone know? Do they use the cheaper shallow packet inspection or what?