[ NNSquad ] Re: Speculation, how ATT can implement copyright filtering without wiretapping/dpi...

2008-01-28 Thread Edward Almasy
On Jan 28, 2008, at 4:32 AM, Richard Bennett wrote: There is a risk of unfair shut-offs, but it's very, very small and can be dealt with after the fact in some reasonable way. I would suggest that the very existence of NNSquad belies this argument. It's likely that few if any on this list

[ NNSquad ] Re: Speculation, how ATT can implement copyright filtering without wiretapping/dpi...

2008-01-28 Thread Nick Weaver
I think there are a few misunderstandings... On Jan 28, 2008 9:07 AM, Lauren Weinstein [EMAIL PROTECTED] wrote: The only reason that offending torrents can be so easily identified (especially in an automated manner) is that the operators of such systems have not seen a need (up to now) to

[ NNSquad ] Re: Speculation, how ATT can implement copyright filtering without wiretapping/dpi...

2008-01-28 Thread Kevin McArthur
I'm going to wind-down on this thread, but what would happen to video's like 'Telus Idol', that are very controversial in that copyright is not crystal clear, and the dealing likely fair (news reporting). See: http://www.michaelgeist.ca/content/view/1999/125/ for the back story. Would the

[ NNSquad ] Re: Speculation, how ATT can implement copyright filtering without wiretapping/dpi...

2008-01-28 Thread John Haverland
While there may indeed be those who are part of the Net Neutrality effort in hopes of using piracy towards their own ends, that does not negate the argument that BitTorrent does have legimate uses and the actions that Comcast took impacted the usability of BotTorrent for entirely legal

[ NNSquad ] Re: Speculation, how ATT can implement copyright filtering without wiretapping/dpi...

2008-01-28 Thread Edward Almasy
On Jan 28, 2008, at 11:54 AM, Nick Weaver wrote: Thus all the schemes for video DNA and audio DNA tracking are robust in the arms race, at least with a bit of effort. I believe you're grossly underestimating the power of even the existing tools for obfuscation, as well as the ingenuity of