<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Encrypting BitTorrent to take out traffic shapers</title>
	<atom:link href="http://torrentfreak.com/encrypting-bittorrent-to-take-out-traffic-shapers/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com/encrypting-bittorrent-to-take-out-traffic-shapers/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 02:35:14 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: Zwartbaard &#187; Blog Archive &#187; Help Azureus to Fight BitTorrent Throttling ISPs</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-455201</link>
		<dc:creator><![CDATA[Zwartbaard &#187; Blog Archive &#187; Help Azureus to Fight BitTorrent Throttling ISPs]]></dc:creator>
		<pubDate>Wed, 16 Jul 2008 08:40:59 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-455201</guid>
		<description><![CDATA[[...] traffic, Azureus was one of the first BitTorrent clients to introduce a countermeasure, namely, protocol header encryption. However, this was only the beginning of an ongoing cat and mouse game between ISPs and BitTorrent [...]]]></description>
		<content:encoded><![CDATA[<p>[...] traffic, Azureus was one of the first BitTorrent clients to introduce a countermeasure, namely, protocol header encryption. However, this was only the beginning of an ongoing cat and mouse game between ISPs and BitTorrent [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ColumboTrek</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-436331</link>
		<dc:creator><![CDATA[ColumboTrek]]></dc:creator>
		<pubDate>Mon, 30 Jun 2008 13:01:40 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-436331</guid>
		<description><![CDATA[Might I point out that in this arms race, the firewall/packet shaper is in a perfect position to be &quot;man in the middle&quot; and as such will be able to intercept any encryption key and use it to look into any encrypted content.  Its only a matter of time.]]></description>
		<content:encoded><![CDATA[<p>Might I point out that in this arms race, the firewall/packet shaper is in a perfect position to be &#8220;man in the middle&#8221; and as such will be able to intercept any encryption key and use it to look into any encrypted content.  Its only a matter of time.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: hell</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-434239</link>
		<dc:creator><![CDATA[hell]]></dc:creator>
		<pubDate>Sat, 28 Jun 2008 19:35:19 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-434239</guid>
		<description><![CDATA[fuck you  ISP_Bob]]></description>
		<content:encoded><![CDATA[<p>fuck you  ISP_Bob</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ttox</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-428248</link>
		<dc:creator><![CDATA[Ttox]]></dc:creator>
		<pubDate>Mon, 23 Jun 2008 14:42:08 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-428248</guid>
		<description><![CDATA[HI, thanks for the topic.

I guess this is quit an old one for a lot people but as you might not now, in France a new law is making P2P Encryption popping in first page news.

The governement will force the ISPs to monitor P2P trafic an report it. After 2 mail telling you that you are Uploading illegal material, they will cut your Internet connection for a period of 3 months to a full year !!!

So, my question is simple, is this encryption protocol efficient enough  in the ISPs are looking for this kind of trafis ? 
If not, is there anoter and (or) better way to encrypt your P2P trafic? 

Thx again and pardon my English... I&#039;m  French  :p]]></description>
		<content:encoded><![CDATA[<p>HI, thanks for the topic.</p>
<p>I guess this is quit an old one for a lot people but as you might not now, in France a new law is making P2P Encryption popping in first page news.</p>
<p>The governement will force the ISPs to monitor P2P trafic an report it. After 2 mail telling you that you are Uploading illegal material, they will cut your Internet connection for a period of 3 months to a full year !!!</p>
<p>So, my question is simple, is this encryption protocol efficient enough  in the ISPs are looking for this kind of trafis ?<br />
If not, is there anoter and (or) better way to encrypt your P2P trafic? </p>
<p>Thx again and pardon my English&#8230; I&#8217;m  French  :p</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Michael S.</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-394637</link>
		<dc:creator><![CDATA[Michael S.]]></dc:creator>
		<pubDate>Sat, 24 May 2008 22:17:08 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-394637</guid>
		<description><![CDATA[We run a network with shared internet access, and apparently do house such a &#039;power-user&#039; who saturates the internet line 24/7 to the point where any realtime traffic for anyone else is pointless. They use BitTorrent, of course.

So, I have to shape them completely. I&#039;d love to just shape their BitTorrent so that they can still use Skype, HTTP and everything as they wish, but since BitTorrent attempts to snake its way around the shaping, there is no other way than to shape the entire port on the switch down to a limit where I feel everyone else will be fine even if that bandwidth is used 24/7.

The point is really that sometimes such restrictions are in place for a reason. At the end of the day you shouldn&#039;t use a service for something that causes problems for others.]]></description>
		<content:encoded><![CDATA[<p>We run a network with shared internet access, and apparently do house such a &#8216;power-user&#8217; who saturates the internet line 24/7 to the point where any realtime traffic for anyone else is pointless. They use BitTorrent, of course.</p>
<p>So, I have to shape them completely. I&#8217;d love to just shape their BitTorrent so that they can still use Skype, HTTP and everything as they wish, but since BitTorrent attempts to snake its way around the shaping, there is no other way than to shape the entire port on the switch down to a limit where I feel everyone else will be fine even if that bandwidth is used 24/7.</p>
<p>The point is really that sometimes such restrictions are in place for a reason. At the end of the day you shouldn&#8217;t use a service for something that causes problems for others.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: bob</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-367920</link>
		<dc:creator><![CDATA[bob]]></dc:creator>
		<pubDate>Fri, 02 May 2008 08:21:11 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-367920</guid>
		<description><![CDATA[So ESA is spying on people now?
&quot;Dear Rogers Cable Communications Inc.:
 
 The Entertainment Software Association (ESA) is a trade association that represents the intellectual property interests of numerous companies that publish interactive games for video game consoles, personal computers, handheld devices and the Internet in the United States of America, in Canada, and in other countries (collectively referred to as ESA members).  ESA is authorized to act on behalf of ESA members whose copyright and other intellectual property rights it believes to be infringed as described herein.
 
 ESA is providing this letter of notification to make Rogers Cable Communications Inc. aware of material on its network or system that infringes the exclusive copyright rights of and is unlawful towards one or more ESA members.
 
 ESA members are entitled to the full protection of Canadian intellectual property laws, including the Copyright Act, R.S.C. 1985, c. C-42, as amended, in such entertainment software products.  
 
 Based on the information at its disposal on 18 Apr 2008 03:50:38 GMT, ESA has a good faith belief that ******** infringes the rights of one or more ESA members by offering for sale or download unauthorized copies of game products protected by copyright, or offering for sale or download material that is the subject of infringing activities.  The copyrighted works that have been infringed include but are not limited to:
 
 Title: Assassin&#039;s Creed
 Infringement Source: BitTorrent
 Infringement Timestamp: 18 Apr 2008 03:50:38 GMT
 Infringement Last Documented: 18 Apr 2008 03:50:38 GMT
 Infringer Username: 
 Infringing Filename: ***********
 Infringing Filesize: 6899044196
 Infringer IP Address: **********
 Infringer DNS Name: **********
 Infringing URL: http://218.145.160.136:8080/announce&quot;]]></description>
		<content:encoded><![CDATA[<p>So ESA is spying on people now?<br />
&#8220;Dear Rogers Cable Communications Inc.:</p>
<p> The Entertainment Software Association (ESA) is a trade association that represents the intellectual property interests of numerous companies that publish interactive games for video game consoles, personal computers, handheld devices and the Internet in the United States of America, in Canada, and in other countries (collectively referred to as ESA members).  ESA is authorized to act on behalf of ESA members whose copyright and other intellectual property rights it believes to be infringed as described herein.</p>
<p> ESA is providing this letter of notification to make Rogers Cable Communications Inc. aware of material on its network or system that infringes the exclusive copyright rights of and is unlawful towards one or more ESA members.</p>
<p> ESA members are entitled to the full protection of Canadian intellectual property laws, including the Copyright Act, R.S.C. 1985, c. C-42, as amended, in such entertainment software products.  </p>
<p> Based on the information at its disposal on 18 Apr 2008 03:50:38 GMT, ESA has a good faith belief that ******** infringes the rights of one or more ESA members by offering for sale or download unauthorized copies of game products protected by copyright, or offering for sale or download material that is the subject of infringing activities.  The copyrighted works that have been infringed include but are not limited to:</p>
<p> Title: Assassin&#8217;s Creed<br />
 Infringement Source: BitTorrent<br />
 Infringement Timestamp: 18 Apr 2008 03:50:38 GMT<br />
 Infringement Last Documented: 18 Apr 2008 03:50:38 GMT<br />
 Infringer Username:<br />
 Infringing Filename: ***********<br />
 Infringing Filesize: 6899044196<br />
 Infringer IP Address: **********<br />
 Infringer DNS Name: **********<br />
 Infringing URL: <a href="http://218.145.160.136:8080/announce" rel="nofollow">http://218.145.160.136:8080/announce</a>&#8220;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tech, How to, Software Reviews, Linux, Dog, Make Money Online with AhTim</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-358774</link>
		<dc:creator><![CDATA[Tech, How to, Software Reviews, Linux, Dog, Make Money Online with AhTim]]></dc:creator>
		<pubDate>Thu, 24 Apr 2008 21:35:26 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-358774</guid>
		<description><![CDATA[&lt;strong&gt;Free Data Encryption Tool...&lt;/strong&gt;

I have showed you the way to protect files and folders with Folder Protector 5.0. Have you take action to protect your confidential files and folders? Well, its all depends on your needs. But I highly recommend you to protect them or at least encrypt t...]]></description>
		<content:encoded><![CDATA[<p><strong>Free Data Encryption Tool&#8230;</strong></p>
<p>I have showed you the way to protect files and folders with Folder Protector 5.0. Have you take action to protect your confidential files and folders? Well, its all depends on your needs. But I highly recommend you to protect them or at least encrypt t&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: BlueRat</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-319086</link>
		<dc:creator><![CDATA[BlueRat]]></dc:creator>
		<pubDate>Wed, 26 Mar 2008 16:06:12 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-319086</guid>
		<description><![CDATA[Yay for bellsouth! My ISP has a clean record so far.]]></description>
		<content:encoded><![CDATA[<p>Yay for bellsouth! My ISP has a clean record so far.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anonymous</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-316708</link>
		<dc:creator><![CDATA[Anonymous]]></dc:creator>
		<pubDate>Sun, 23 Mar 2008 02:48:34 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-316708</guid>
		<description><![CDATA[Stuff like this is why I&#039;ll be switching to a new ISP. 

Sympatico now uses whitelist-based throttling and whenever someone else in the house is using BitTorrent, Subversion, DCC file send, and anything encrypted that doesn&#039;t seem to be HTTPS will time out.]]></description>
		<content:encoded><![CDATA[<p>Stuff like this is why I&#8217;ll be switching to a new ISP. </p>
<p>Sympatico now uses whitelist-based throttling and whenever someone else in the house is using BitTorrent, Subversion, DCC file send, and anything encrypted that doesn&#8217;t seem to be HTTPS will time out.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: atypiccal</title>
		<link>/encrypting-bittorrent-to-take-out-traffic-shapers/#comment-314012</link>
		<dc:creator><![CDATA[atypiccal]]></dc:creator>
		<pubDate>Tue, 18 Mar 2008 21:32:56 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=117#comment-314012</guid>
		<description><![CDATA[[quote comment=&quot;558&quot;]I don&#039;t understand why you guys are ignoring one of Brams principal objections - namely that it won&#039;t work, as ISPs will still be able to packet shape traffic with more advanced shaping rules, and if one day it gets to the point where they can&#039;t do that they&#039;ll just enforce draconian rules on EVERYBODY. You guys are the few who are ruining it for the many, please stop![/quote]]]></description>
		<content:encoded><![CDATA[<p>[quote comment="558"]I don&#8217;t understand why you guys are ignoring one of Brams principal objections &#8211; namely that it won&#8217;t work, as ISPs will still be able to packet shape traffic with more advanced shaping rules, and if one day it gets to the point where they can&#8217;t do that they&#8217;ll just enforce draconian rules on EVERYBODY. You guys are the few who are ruining it for the many, please stop![/quote]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
