Quote:
|
Originally Posted by Fawkes
Ok, I understand that NTL will only be looking at the protocols and ports its users are using and that this is done on a machine level. But Iâ₠¬ÃƒÆ’¢â€žÂ¢m still concerned about how this general data is used. IF it is only used to prioritise time sensitive traffic like VoIP than thatââ‚ ¬Ã¢â€žÂ¢s fine. But if it is used in the way I described in a previous post:
- restrict traffic to destination X over destination Y because NTL has some deal with Y.
etc
|
Already done, it's called peering and transit.