<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Microsoft RickRolls Port Slamming BitTorrent Users</title>
	<atom:link href="http://torrentfreak.com/microsoft-rickrolls-port-slamming-bittorrent-users-100219/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com/microsoft-rickrolls-port-slamming-bittorrent-users-100219/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 21:09:27 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: Microsoft&#8217;s War Against BitTorrent Ends In a RickRoll &#171; Techknology&#39;s Blog</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-642227</link>
		<dc:creator><![CDATA[Microsoft&#8217;s War Against BitTorrent Ends In a RickRoll &#171; Techknology&#39;s Blog]]></dc:creator>
		<pubDate>Mon, 22 Feb 2010 15:32:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-642227</guid>
		<description><![CDATA[[...] to Codify the problem with BitTorrent users on a public Wi-Fi network isn&#8217;t bandwidth, but excessive port usage. “At this point you have to remember that we have a heap of bandwidth available. Some clients [...]]]></description>
		<content:encoded><![CDATA[<p>[...] to Codify the problem with BitTorrent users on a public Wi-Fi network isn&#8217;t bandwidth, but excessive port usage. “At this point you have to remember that we have a heap of bandwidth available. Some clients [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Microsoft usa script rickroll contro gli utenti BitTorrent</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-642081</link>
		<dc:creator><![CDATA[Microsoft usa script rickroll contro gli utenti BitTorrent]]></dc:creator>
		<pubDate>Mon, 22 Feb 2010 05:02:45 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-642081</guid>
		<description><![CDATA[[...] Microsoft Tech.Ed Australia 2009, da parte di alcuni operatori della connessione wifi che hanno ammesso di aver preso provvedimenti contro utenti che cercavano di accedere ai siti BitTorrent, a causa [...]]]></description>
		<content:encoded><![CDATA[<p>[...] Microsoft Tech.Ed Australia 2009, da parte di alcuni operatori della connessione wifi che hanno ammesso di aver preso provvedimenti contro utenti che cercavano di accedere ai siti BitTorrent, a causa [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ????</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-642079</link>
		<dc:creator><![CDATA[????]]></dc:creator>
		<pubDate>Mon, 22 Feb 2010 04:22:27 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-642079</guid>
		<description><![CDATA[WOW
the internet is full of morons that dont now how to read a damn article before posting]]></description>
		<content:encoded><![CDATA[<p>WOW<br />
the internet is full of morons that dont now how to read a damn article before posting</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Microsoft RickRolls Port Slamming BitTorrent Users - makin's posterous</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-641950</link>
		<dc:creator><![CDATA[Microsoft RickRolls Port Slamming BitTorrent Users - makin's posterous]]></dc:creator>
		<pubDate>Sun, 21 Feb 2010 15:44:57 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-641950</guid>
		<description><![CDATA[[...] According to the on&#045;site WiFi operators at Microsofts Tech.Ed Australia 2009 conference, abnormal levels of network consumption by some users led them to take action against BitTorrent by Rickrolling users who tried to access the most popular torrent sites. Interestingly, bandwidth usage wasnt the problem.Source:http://torrentfreak.com/microsoft-rickrolls-port-slamming-bittorrent-users-100219/ [...]]]></description>
		<content:encoded><![CDATA[<p>[...] According to the on&#45;site WiFi operators at Microsofts Tech.Ed Australia 2009 conference, abnormal levels of network consumption by some users led them to take action against BitTorrent by Rickrolling users who tried to access the most popular torrent sites. Interestingly, bandwidth usage wasnt the problem.Source:<a href="http://torrentfreak.com/microsoft-rickrolls-port-slamming-bittorrent-users-100219/" rel="nofollow">http://torrentfreak.com/microsoft-rickrolls-port-slamming-bittorrent-users-100219/</a> [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: MakinMo's Tech Blog</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-641923</link>
		<dc:creator><![CDATA[MakinMo's Tech Blog]]></dc:creator>
		<pubDate>Sun, 21 Feb 2010 13:57:01 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-641923</guid>
		<description><![CDATA[[...] to access the most popular torrent sites. Interestingly, bandwidth usage wasnt the problem.Source:http://torrentfreak.com/microsoft-rickrolls-port-slamming-bittorrent-users-100219/   Feb [...]]]></description>
		<content:encoded><![CDATA[<p>[...] to access the most popular torrent sites. Interestingly, bandwidth usage wasnt the problem.Source:<a href="http://torrentfreak.com/microsoft-rickrolls-port-slamming-bittorrent-users-100219/" rel="nofollow">http://torrentfreak.com/microsoft-rickrolls-port-slamming-bittorrent-users-100219/</a>   Feb [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Irrelevant</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-641915</link>
		<dc:creator><![CDATA[Irrelevant]]></dc:creator>
		<pubDate>Sun, 21 Feb 2010 13:14:17 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-641915</guid>
		<description><![CDATA[@66

On an additional note,

&gt;mask any p2p traffic

This phrase doesn&#039;t mean anything whatsoever. All traffic on the internet is &quot;p2p traffic&quot; with enough wrappers and misdirection you COULD mask any traffic. Pragmatically, though, bittorrent is not gnutella is not napster is not fastrack is not tor is not freenet is DCC.

All of these protocols work in very, very different ways. Bittorrent can be trained to be fairly indiscernable (although, as you pointed out, a little slower than it would otherwise be) whereas masking gnutella would prove more difficult without serious modification to the software involved.]]></description>
		<content:encoded><![CDATA[<p>@66</p>
<p>On an additional note,</p>
<p>&gt;mask any p2p traffic</p>
<p>This phrase doesn&#8217;t mean anything whatsoever. All traffic on the internet is &#8220;p2p traffic&#8221; with enough wrappers and misdirection you COULD mask any traffic. Pragmatically, though, bittorrent is not gnutella is not napster is not fastrack is not tor is not freenet is DCC.</p>
<p>All of these protocols work in very, very different ways. Bittorrent can be trained to be fairly indiscernable (although, as you pointed out, a little slower than it would otherwise be) whereas masking gnutella would prove more difficult without serious modification to the software involved.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Irrelevant</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-641914</link>
		<dc:creator><![CDATA[Irrelevant]]></dc:creator>
		<pubDate>Sun, 21 Feb 2010 13:10:31 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-641914</guid>
		<description><![CDATA[@66

&gt;Blocking UDP? Hardly invincible.

The torrent protocol does not use UDP for data transfer.

&gt;No it does not.

Yes, it does. To someone snooping my traffic all they can see is that I am sending packets of &quot;data&quot;. They cannot reasonably (i&#039;m sure TEH NSA has super secret quantum computers on the moon that could decrypt them in some billion years) decrypt the type of packet or what the packet contains. Now, somebody could just connect to the swarm and request the data from my client, but that is not the level at which the encryption of the protocol operates at.

&gt;Whilst sure, theoretically, what you’re saying is correct the downside of BT being undetected is that it is so slow as to be unuseable.

It would only be slow to &quot;get started&quot;. Once you have connected to your peers and begin transferring data the number of connections you make and attempt are meaningless. Once my torrent client has scraped the data it needs from the tracker and finds a good set of seed/peers and connects to them successfully, everything will progress as it always does.]]></description>
		<content:encoded><![CDATA[<p>@66</p>
<p>&gt;Blocking UDP? Hardly invincible.</p>
<p>The torrent protocol does not use UDP for data transfer.</p>
<p>&gt;No it does not.</p>
<p>Yes, it does. To someone snooping my traffic all they can see is that I am sending packets of &#8220;data&#8221;. They cannot reasonably (i&#8217;m sure TEH NSA has super secret quantum computers on the moon that could decrypt them in some billion years) decrypt the type of packet or what the packet contains. Now, somebody could just connect to the swarm and request the data from my client, but that is not the level at which the encryption of the protocol operates at.</p>
<p>&gt;Whilst sure, theoretically, what you’re saying is correct the downside of BT being undetected is that it is so slow as to be unuseable.</p>
<p>It would only be slow to &#8220;get started&#8221;. Once you have connected to your peers and begin transferring data the number of connections you make and attempt are meaningless. Once my torrent client has scraped the data it needs from the tracker and finds a good set of seed/peers and connects to them successfully, everything will progress as it always does.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Gargamel</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-641893</link>
		<dc:creator><![CDATA[Gargamel]]></dc:creator>
		<pubDate>Sun, 21 Feb 2010 11:59:32 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-641893</guid>
		<description><![CDATA[&quot;completely invincible short of banning encryption or blocking the entire connection entirely&quot;

Blocking UDP?  Hardly invincible.

&quot;It masks what the packet is&quot;

It masks the header.  So yes in a manner of speaking that is correct.

&quot;and the data inside the packet.&quot;

No it does not.

&quot;So your only solution is vague traffic analysis (that I can still get around with conservative enough settings)&quot;

Seeing as no other common applications behave like a p2p application it doesn&#039;t really matter just how vague traffic analysis is.  

You seem to be saying that given the right settings a p2p application, ie. BT, is undetectable.  Whilst sure, theoretically, what you&#039;re saying is correct the downside of BT being undetected is that it is so slow as to be unuseable.  So what would be the point? 

You seem to be proposing that using settings you can mask any p2p traffic so it&#039;s no longer detectable as such.  Funny then, is it not, that these conservative settings are not used to avoid throttling then isn&#039;t it.  Actually no it isn&#039;t - the settings would make the client unworkably slow.]]></description>
		<content:encoded><![CDATA[<p>&#8220;completely invincible short of banning encryption or blocking the entire connection entirely&#8221;</p>
<p>Blocking UDP?  Hardly invincible.</p>
<p>&#8220;It masks what the packet is&#8221;</p>
<p>It masks the header.  So yes in a manner of speaking that is correct.</p>
<p>&#8220;and the data inside the packet.&#8221;</p>
<p>No it does not.</p>
<p>&#8220;So your only solution is vague traffic analysis (that I can still get around with conservative enough settings)&#8221;</p>
<p>Seeing as no other common applications behave like a p2p application it doesn&#8217;t really matter just how vague traffic analysis is.  </p>
<p>You seem to be saying that given the right settings a p2p application, ie. BT, is undetectable.  Whilst sure, theoretically, what you&#8217;re saying is correct the downside of BT being undetected is that it is so slow as to be unuseable.  So what would be the point? </p>
<p>You seem to be proposing that using settings you can mask any p2p traffic so it&#8217;s no longer detectable as such.  Funny then, is it not, that these conservative settings are not used to avoid throttling then isn&#8217;t it.  Actually no it isn&#8217;t &#8211; the settings would make the client unworkably slow.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Irrelevant</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-641890</link>
		<dc:creator><![CDATA[Irrelevant]]></dc:creator>
		<pubDate>Sun, 21 Feb 2010 11:27:56 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-641890</guid>
		<description><![CDATA[@64

&gt;LRN2BITTORRENTS LOL

LOL. DHT + PEX + TOR...

&gt;“We quickly built a list of all of the top torrent trackers around and got the nod from Jorke [Odolphi, Web Platform Architect Evangelist for Microsoft Australia] to add them all to the local DNS resolver and point them at a local web server containing some RickRoll scripts.”

... just got around that. DHT+PEX make actually being able to get to the tracker irrelevant. And tor lets you get new swarm information from indexers.

As for...

&gt;Microsoft also created a script which categorized WiFi users with a ‘naughty factor’, meaning those with the greatest number of active port mappings to distinct remote hosts were identified as BitTorrent users.

... I can adjust what range of ports my client uses. I can also control how many connections it will attempt in what timespan and how many it will maintain. I can just keep rotating my MAC address until I find their limit.

&gt;It does not provide any masking of data 

Actually, yes it does. Thats the entire point. It masks what the packet is and the data inside the packet. Sure, you can still see that I&#039;m sending &quot;data&quot; over whatever range of ports to peers that don&#039;t seem &quot;appropriate&quot; but all you can really do is &quot;assume&quot; that my traffic &quot;looks like bittorrent&quot;.

So your only solution is vague traffic analysis (that I can still get around with conservative enough settings) and cutting me off completely if my traffic patterns are &quot;suspect&quot;.

On that note, however, creators of bittorrent clients should really give them more conservative default settings. And users should be more responsible with their use of the protocol. But, my point is, they didn&#039;t actually block bittorrent. They just made it more difficult to use/forced users to be more responsible or get off.]]></description>
		<content:encoded><![CDATA[<p>@64</p>
<p>&gt;LRN2BITTORRENTS LOL</p>
<p>LOL. DHT + PEX + TOR&#8230;</p>
<p>&gt;“We quickly built a list of all of the top torrent trackers around and got the nod from Jorke [Odolphi, Web Platform Architect Evangelist for Microsoft Australia] to add them all to the local DNS resolver and point them at a local web server containing some RickRoll scripts.”</p>
<p>&#8230; just got around that. DHT+PEX make actually being able to get to the tracker irrelevant. And tor lets you get new swarm information from indexers.</p>
<p>As for&#8230;</p>
<p>&gt;Microsoft also created a script which categorized WiFi users with a ‘naughty factor’, meaning those with the greatest number of active port mappings to distinct remote hosts were identified as BitTorrent users.</p>
<p>&#8230; I can adjust what range of ports my client uses. I can also control how many connections it will attempt in what timespan and how many it will maintain. I can just keep rotating my MAC address until I find their limit.</p>
<p>&gt;It does not provide any masking of data </p>
<p>Actually, yes it does. Thats the entire point. It masks what the packet is and the data inside the packet. Sure, you can still see that I&#8217;m sending &#8220;data&#8221; over whatever range of ports to peers that don&#8217;t seem &#8220;appropriate&#8221; but all you can really do is &#8220;assume&#8221; that my traffic &#8220;looks like bittorrent&#8221;.</p>
<p>So your only solution is vague traffic analysis (that I can still get around with conservative enough settings) and cutting me off completely if my traffic patterns are &#8220;suspect&#8221;.</p>
<p>On that note, however, creators of bittorrent clients should really give them more conservative default settings. And users should be more responsible with their use of the protocol. But, my point is, they didn&#8217;t actually block bittorrent. They just made it more difficult to use/forced users to be more responsible or get off.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: GOLLY, IS IT THAT EASY!</title>
		<link>/microsoft-rickrolls-port-slamming-bittorrent-users-100219/#comment-641887</link>
		<dc:creator><![CDATA[GOLLY, IS IT THAT EASY!]]></dc:creator>
		<pubDate>Sun, 21 Feb 2010 10:23:46 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=21678#comment-641887</guid>
		<description><![CDATA[&quot;DHT + PEX + Encryption + getting your infohashes over tor = completely invincible short of banning encryption or blocking the entire connection entirely&quot;

DHT + PEX leads to connections no different to any other peer to peer connection over BT.  Actually in some cases it can lead to more ports being used as each torrent instance needs to have a corresponding hash found over the network. 

Encryption as used in BT = masking header data which is next to useless as far as masking BT traffic.  It does not provide any masking of data or it&#039;s origin/destination.  It does not hide any ports that are being used.

In short none of the above are going to make any difference.  And in this situation described in the article they were&#039;nt worried about transfers as much as port usage.

LRN2BITTORRENTS LOL]]></description>
		<content:encoded><![CDATA[<p>&#8220;DHT + PEX + Encryption + getting your infohashes over tor = completely invincible short of banning encryption or blocking the entire connection entirely&#8221;</p>
<p>DHT + PEX leads to connections no different to any other peer to peer connection over BT.  Actually in some cases it can lead to more ports being used as each torrent instance needs to have a corresponding hash found over the network. </p>
<p>Encryption as used in BT = masking header data which is next to useless as far as masking BT traffic.  It does not provide any masking of data or it&#8217;s origin/destination.  It does not hide any ports that are being used.</p>
<p>In short none of the above are going to make any difference.  And in this situation described in the article they were&#8217;nt worried about transfers as much as port usage.</p>
<p>LRN2BITTORRENTS LOL</p>
]]></content:encoded>
	</item>
</channel>
</rss>
