Thread: Traffic Shaping
View Single Post
Old 02-04-2006, 19:16   #145
DVS
Inactive
 
DVS's Avatar
 
Join Date: Nov 2003
Location: Lancs
Services: 3Mbit STB broadband TV Base Pack 321 Phone
Posts: 108
DVS is an unknown quantity at this point
Re: Traffic Shaping

Quote:
Originally Posted by Ignition
I guess you aren't a big fan of the fact ntl are legally obliged to be able to monitor your phone calls at any time.
I have no problem with them being legally obliged to be able to monitor my phone. I'd have a serious problem if they routinuely did with no legal compulsion.
Quote:
Originally Posted by Ignition
It's bull on zero levels, your IP traffic isn't protected by any legal statute and no record is made of the contents of the packets merely the protocol being used.
That hits the nail on the head and is I believe a failure with the legal system. I also wonder wether existing statutes could come into play with the likes of VOIP traffic? I'm no lawyer so I'll leave that to the legal beagles but there is a definite link between PTSN statutes and data networks that carry VOIP (IMO).
Quote:
Originally Posted by Ignition
Think outside of the OSI 7 layer model and you're there. The traffic shaping gear will know you were using Bittorrent, it won't have stored which torrent you were using. To gain knowledge of exactly which torrent you are downloading is to assume legal responsibility for your behaviour (being aware of exactly what a customer is doing suggests responsibility for it) and puts ntl at legal risk.
That's all fine, but the fact that they know, or at least, look at what I'm doing is an invasion of my privacy.
Quote:
Originally Posted by Ignition
I hope this in some small way reassures. Yes ntl will be able to tell that you were using Bittorrent, VoIP, http, etc, however the actual contents of those sessons remains a mystery.
Unfortunately there's no reassurance in what's been said. I'm not trying to be argumentative but the above in it's own right is an invasion of my privacy. Why the hell should NTL know that I'm using FTP or HTTP or NTTP etc etc. That is none of their business. I pay for a data connection not a data connection that looks at what I'm using it for and decides wether to slow down my traffic flow.
Quote:
Originally Posted by Ignition
The only reason for the packet inspection is because a layer 4 lookup on the protocols is trivial to avoid.
Very true but it is becoming increasingly possible to 'hide' traffic through encryption. so even Layer 7 shaping is ineffectual. Whose betting that over time we will see all encrytped, or non identifiable traffic, shaped?
DVS is offline   Reply With Quote