backtop


Print 48 comment(s) - last by Hacp.. on Oct 27 at 12:23 AM

ISP Giant Compares Its Filtering with a Busy Signal

Lawyers and privacy groups are reportedly “circling the waters” over Comcast, who stands accused of using an aggressive kind of traffic shaping that impersonates individual P2P users and compels their computers to automatically disconnect.

Comcast’s actions are perfectly permissible under the terms of use described in its contract with customers, which states that Comcast reserves the right to “refuse to upload, post, publish, transmit or store any information or materials, in whole or in part, that, in (its) sole discretion, is … undesirable or in violation of (the) agreement.”

However, many are concerned that Comcast’s actions with regards to BitTorrent traffic – that is, impersonating users’ computers – may not entirely be legal as many states have laws regarding impersonation. In the state of New York, for example, section 190.25 of the penal code describes the crime of “criminal impersonation in the second degree,” in which one may not “[pretend] to be a representative of some person or organization and does an act … with intent to obtain a benefit or to injure or defraud another.”

While legal grounds may be shaky at this point, the EFF has reported that it has received numerous calls from various firms that are considering legal action.

Meanwhile, Comcast has adjusted its response. The original response, says Brad Stone of The New York Times, seems to have caught Comcast’s PR department off-guard. The new response reads, “Comcast does not block access to any Web sites or online applications, including peer-to-peer services like BitTorrent … we have a responsibility to provide all of our customers with a good Internet experience and we use the latest technologies to manage our network so that they can continue to enjoy these applications.”

The reality, however, is more complicated says Stone. Speaking on anonymity, a Comcast internet executive told The New York Times that Comcast was indeed manipulating traffic, through data management technologies designed to conserve bandwidth. As part of that process, the company will attempt to delay P2P traffic to preserve other users’ quality of service. He described the process as being akin to the busy signal in a phone call: users are perfectly able to hang up and try again later.

“In cases where peer to peer file transfers are interrupted,” writes Stone, “the software automatically tries again, so the user may not even know Comcast is interfering.”



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: FINALLY
By mindless1 on 10/23/2007 7:07:19 PM , Rating: 2
True, you will not often get the max your line can deliver, but the crucial point is where the bottleneck is, that regardless of what the other end and intermediary network can sustain, that once it's onto your provider's network, they have implied towards the end of advertising a specific service, that they have facilities (bandwidth, etc) to allow it, not just once in a blue moon but rather for the continual use of the service.

Naturally due to the shared bandwidth nature of the service, some latitude is necessary, but not too much, as that would just allow them to go even further overpopulating segments. Nobody expects them to be perfect, but always due diligence in meeting their claims.


"We shipped it on Saturday. Then on Sunday, we rested." -- Steve Jobs on the iPad launch

Related Articles
Comcast Screws with File-Sharing Traffic
October 19, 2007, 8:07 PM













botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki