On 9/7/07, Florent Daignière <[EMAIL PROTECTED]> wrote: > * Matthew Toseland <[EMAIL PROTECTED]> [2007-09-07 13:49:26]: > > > Seems to be on a traffic analysis level as it works on encrypted bittorrent > > - > > I wonder if this would block Freenet? > > > > http://torrentfreak.com/comcast-throttles-bittorrent-traffic-seeding-impossible/ > > http://www.dslreports.com/forum/r18323368-Comcast-is-using-Sandvine-to-manage-P2P-Connections > > > > Thanks to whoever originally sent me this URL! > > Nothing new as far as I can see ... killing TCP sessions sending out > RSTs is what China has been doing for years! >
The interesting bit is how they identify the connections to kill, particularly if encryption is in use. I reckon they could probably do most of the stuff they're advertising (most of the time) by monitoring the unencrypted communication with the tracker. Of course, this could result in them missing connections - particularly encrypted ones - or killing ones they shouldn't (for example, if it's set to prevent seeding and there are peers in common between a torrent a user is seeding to and one they're leeching from). Then again, they could be doing some sort of traffic analysis. (Of course, that'd probably have even more problems.) I think I saw an interesting comment on /. somewhere about that. Aidan (a.k.a. makomk) _______________________________________________ chat mailing list chat@freenetproject.org Archived: http://news.gmane.org/gmane.network.freenet.general Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat Or mailto:[EMAIL PROTECTED]