Transparent IPv4-to-IPv6 tunneling, detection of certain 
forms of abuse, QoS modificaton, traffic monitoring and 
shaping.

Obviouly, these are mostly happening at a firewall or 
equivalent, which is kind of the point. Very little DPI
is legitimate in core networking.

/P

On 05 December, 2012 - Wayne Moore wrote:

> What legitimate uses do you see?
> 
> On 12/5/2012 10:34, Petter Ericson wrote:
> > There are legitimate uses for DPI,
> 
> -- 
> Necessity is the plea for every infringement of human freedom.
> It is the argument of tyrants; it is the creed of slaves.
> 
>     William Pitt (1759-1806)
> 
> --
> Unsubscribe, change to digest, or change password at: 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech

-- 
Petter Ericson ([email protected])

Telecomix Sleeper Jellyfish
--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to