Apparently ISPs are degrading service to p2p traffic and everything 
encrypted for their users. 
http://it.slashdot.org/article.pl?sid=07/04/07/1755230

1. Does anyone know what packet inspection algorithms are being used for 
ISPs for finding p2p traffic? Given the variety of p2p protocols in use 
and the frequency at which they change I would guess that a port based or bit 
pattern based filers would not be totally effective.
2. Are their ways that p2p data that uses ssh can be distinguished from 
say an e-commerce transaction by an ISP?

-- Roop
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to