Quote:
|
Originally Posted by DVS
That is bull IMO on mutliple levels. I use NTLs phone system, does that give them the right to listen to my phone calls, even with non-human means. I very much doubt that as it would surely be classified as an illegal wiretap. Why should a data network, which by the way carries VOIP traffic, be treated any differently? If they are shaping at the transport layer then that is a different matter, something I'd appropriate to line routing on the PSTN, but deep packet inspection is simply wrong and IMO a breach of my privacy. Wether it's a computer or a human being doing the inspection is irrelevant!
|
I guess you aren't a big fan of the fact ntl are legally obliged to be able to monitor your phone calls at any time.
It's bull on zero levels, your IP traffic isn't protected by any legal statute and no record is made of the contents of the packets merely the protocol being used.
Think outside of the OSI 7 layer model and you're there. The traffic shaping gear will know you were using Bittorrent, it won't have stored which torrent you were using. To gain knowledge of exactly which torrent you are downloading is to assume legal responsibility for your behaviour (being aware of exactly what a customer is doing suggests responsibility for it) and puts ntl at legal risk.
I hope this in some small way reassures. Yes ntl will be able to tell that you were using Bittorrent, VoIP, http, etc, however the actual contents of those sessons remains a mystery.
The only reason for the packet inspection is because a layer 4 lookup on the protocols is trivial to avoid.