Apparently ISPs are degrading service to p2p traffic and everything encrypted for their users. http://it.slashdot.org/article.pl?sid=07/04/07/1755230
1. Does anyone know what packet inspection algorithms are being used for ISPs for finding p2p traffic? Given the variety of p2p protocols in use and the frequency at which they change I would guess that a port based or bit pattern based filers would not be totally effective. 2. Are their ways that p2p data that uses ssh can be distinguished from say an e-commerce transaction by an ISP? -- Roop _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
