Comment – Major ISPs To Deploy P4P Within Months

In the US, several ISPs (e.g. AT&T, Verizon, Comcast) have been testing the effectiveness of using Pando Networks’ own P2P client, which localizes transfered files, to increase the transfer speeds of files while reducing the flow of traffic between ISPs. These tests have demonstrated that Pando’s solution to P2P traffic ‘overwhelming’ network traffic has largely been successful; far less data is passing between ISPs, with a huge portion of the P2P traffic now being contained to the respective ISPs’ networks . DSLreports is concerned that, there may be hidden costs to the roll-out of these technologies. Perhaps individuals will need to pay a fee to enjoy the enhanced speeds. Perhaps this will correspond with a more invasive content analysis system. Maybe there will be blocks put on ‘non-authorized’ P2P clients.

Personally, I expect that P4P will be used to let ISPs compete in the media-content selling business. Imagine: you can get a movie from iTunes in 20 minutes, or in 2-4 from your ISP. Sure, the analysis and filtering that DSLreports notes could be coming, but I have a suspicion that P4p will be used to undermine the current content distributors first, and that other uses of P4P will follow only after that business model/technique is tested.

Continue reading

Bell Mobility and Solo Mobile make mobile Internet access safer

This is going to be relatively brief, just given a lack of time on my part (who knew that take 4 grad courses in a term, plus doing personal research, would be so time intensive *grin*). After reading a post by Mark Goldberg over at Telecom Trends I found out that Bell is planning to provide parents with a feature that would let them limit web content that their kids could view online. Given Bell’s history of using Deep Packet Inspection (DPI) devices to shape bandwidth use, I wanted to see what the technology they were using to prevent children from accessing particular websites.

The Technology

Bell is investing in Unipier Ltd.’s Intelligent Policy Manager (IPM). From the whitepaper (links to .pdf) on this particular piece of technology, we find that:

The Intelligent Policy Manager communicates with traffic and content interception and enforcement systems such as: IP level deep packet inspection systems, HTTP and SIP proxies, messaging gateways and 3rd party access gateways. Using these systems to
forward events to the IPM, allows it to apply policies on these events. In addition, the IPM integrates with various networks, BSS and content enablers in order to carry out specific actions such as: charging, sending messages or reformatting a piece of content.
Unipier’s IPM also integrates with back-end subscriber, partner and device repositories in order to fetch relevant context information.

Continue reading

Three Strikes and Goodbye World

In this post I’m going to briefly note just how bad an idea it is, for citizens, that ISPs and content providers are working together to resolve ‘copyright infringement’ without having a substantial degree of government involvement.

Rules of the game
Perhaps you’re familiar with baseball (or California penal rules). In either case, you’ll have heard of the ‘three strikes and you’re out’ rule. In baseball, this would mean that a batter returns to the dugout, and another person attempts to swat a ball and race towards first base. In the penal system, it indicates that you’ve committed enough criminal offenses that you’re going to have the book thrown at you . . . the next person behind you in court can then try to argue why they’re innocent, and go free (first base?).

Viva la France! Continue reading

I See Your DPI and Raise You a SSL

A little while ago I was talking about network neutrality and Deep Packet Inspection (DPI) technologies with a person interested in the issue (shocking, I know), and one of the comments that I made went something like this: given the inability of DPI technologies to effectively crack encrypted payloads, it’s only a matter of time until websites start to move towards secure transactions – in other words, it’s only a matter of time until accessing websites will involve sending encrypted data between client computers and servers.

The Pirate Bay and Beyond

Recently, Sweden passed a bill that allows for the wiretapping of electronic communications without a court order. This caused the Pirates Bay, a well-known BitTorrent index site, to announce that it was adding SSL encryption to their website as well as VPN solutions for native Swedes who wanted to avoid the possibility of having their network traffic surveyed. Recently, isohunt.com has done the same, and other major torrent sites are expected to follow the lead. The groups who are running these websites are technically savvy, allowing them to implement encrypted access rapidly and with little technical difficulty, but as more and more sites move to SSL there will be an increasing demand amongst tech-savvy users that their favorite sites similarly protect them from various corporate and government oversight methods.

Continue reading

DPI, Employees, and Proper Inspection

In my last post I alluded to the fact that Deep Packet Inspection (DPI) technologies could be used by businesses to try and reduce the possibility of ‘inappropriate’ employee use of bandwidth and wrongful or accidental transmissions of confidential IP. In that last post I was talking about IT security, and this post will continue to reflect on DPI technologies’ applications and benefits to and for corporate environments.

A Quick Refresher on DPI

From ArsTechnica:

The “deep” in deep packet inspection refers to the fact that these boxes don’t simply look at the header information as packets pass through them. Rather, they move beyond the IP and TCP header information to look at the payload of the packet. The goal is to identify the applications being used on the network, but some of these devices can go much further; those from a company like Narus, for instance, can look inside all traffic from a specific IP address, pick out the HTTP traffic, then drill even further down to capture only traffic headed to and from Gmail, and can even reassemble e-mails as they are typed out by the user. (Source)

For a slightly longer discussion/description of DPI I suggest that you look at the wiki page that I’m gradually putting together on the topic of Deep Packet Inspection.

Continue reading

The Coming of Ubiquitous Bandwidth?

At work, I’m often referred to as the ‘neo-luddite‘ because I don’t advocate the rapid adoption of new technologies for their own sake, nor do I adhere to the position that technologies are inherently value neutral. In fact, I think that technologies are typically inscribed with a particular value-orientation; this orientation is not necessarily the one that is expressed at the technology’s creation. I think that there should be genuine thought and caution advanced when developing technologies that could be destructive to various facets of social life. With the introduction of new technologies comes the possibilities of reshaping cultural traditions, and sure a reshaping shouldn’t be done without at least some forethought. This shouldn’t be taken to mean that I see technology as adding to, or detracting from, a culture, but rather that accompanying a new technology’s adoption is a new cultural system with its own unique environmental characteristics. The world with cellphones isn’t the world as it was, plus cell phones, but instead is an entirely different techno-cultural world. We need to be mindful of the potency of new technologies to reshape facets of our lives through the transmutation or abolition of our traditions – doing otherwise is irresponsible to ourselves and the other members of our society.

Continue reading