<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; dpi</title>
	<atom:link href="http://torrentfreak.com/tag/dpi/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 19:18:38 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Anti-Piracy Measures Don&#8217;t Work, Report Shows</title>
		<link>http://torrentfreak.com/anti-piracy-measures-dont-work-report-shows-090129/</link>
		<comments>http://torrentfreak.com/anti-piracy-measures-dont-work-report-shows-090129/#comments</comments>
		<pubDate>Thu, 29 Jan 2009 13:30:35 +0000</pubDate>
		<dc:creator><![CDATA[Ben Jones]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[dpi]]></category>
		<category><![CDATA[ipoque]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=9227</guid>
		<description><![CDATA[Traffic management company Ipoque has just released a whitepaper, detailing pros and cons of different methods of dealing with piracy on P2P networks. Surprisingly, the conclusions in the paper are not straight adverts for their own products and services. We will highlight some of the Good, the Bad, and the Ugly conclusions.
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.ipoque.com/" target="_blank">Ipoque</a> describes itself as &#8216;the leading European provider of deep packet inspection solutions&#8217;. Based on this statement, it would be expected that the company would take every opportunity to push their own products as possible solutions. However, in what could be the start of a new trend (but one we won&#8217;t hold our breath waiting for from others) a company interested in selling P2P throttling equipment has started to tell the truth about file sharing.</p>
<p>The <a href="http://blog.ipoque.com/2009/01/copyrights-and-the-internet/" target="_blank">paper</a>, which claims to “provide an as objective as possible assessment of the countermeasures for P2P” initially left us skeptical. But, with one or two exceptions, it does what it claims to do. Other companies and politicians should take note of this. Below we look at the conclusions of the report &#8211; some we were actually moved to applaud, while others were slightly cringe worthy.</p>
<h2>The Good</h2>
<p><strong>DNS Blocking</strong></p>
<p style="padding-left: 30px;">&#8220;<em>Blocking of IP addresses could be an additional measure in a combination of different measures, but is not the salvation of the problem itself.</em>&#8220;</p>
<p>Ipoque comes to the right conclusion here. Indeed, DNS blocking is not very effective. As has been proven by The Pirate Bay in their <a href="http://torrentfreak.com/pirate-bay-censorship-case-not-over-yet-081210/">dispute</a> in Denmark, these methods really <a href="http://torrentfreak.com/the-pirate-bay-fights-danish-isp-block-080205/">don&#8217;t work</a>.  </p>
<p><strong>URL Filters</strong></p>
<p style="padding-left: 30px;">&#8220;<em>URL filters are widely available. Centrally hosted services such as Piratebay and even BitTorrent trackers could be blocked. An up-to-date list of URLs is a necessary prerequisite to make this measure effective. Unfortunately, it is nearly impossible to keep the URL database current. Affected sites could rapidly change URLs and propagate these changes. Ultimately, this would result in a never-ending cat and mouse game.</em>&#8220;</p>
<p>Again the report is spot on. The Internet Watch Foundation in the UK <a href="http://www.openrightsgroup.org/2008/12/08/iwf-censors-wikipedia-chaos-ensues/" target="_blank">showed</a> that blocklists don&#8217;t work well when applied to known sites and content. On a sidenote, file-sharers who use blocklists like PeerGuardian to filter peers of uncertain identity, face <a href="http://torrentfreak.com/do-p2p-blocklists-keep-you-safe/">the same problem</a>. </p>
<p><strong>Swarm Poisoning</strong></p>
<p style="padding-left: 30px;"><em>&#8220;[The injection of counterfeits] have driven file sharers to the BitTorrent network, that is nearly immune against injection of fake files, mainly because content distribution is organized through web based torrent directories such as thepiratebay.org. Conclusion: The injection of counterfeits is no effective countermeasure anymore.&#8221;</em></p>
<p>They are right, it doesn&#8217;t. Not on well moderated torrent sites at least. </p>
<p><strong>Fingerprint systems</strong></p>
<p style="padding-left: 30px;"><em>&#8220;Due to its computational complexity, fingerprinting does not work in real-time for high-speed networks. Also, even though ever more file and compression formats are supported, fingerprinting is blind to encrypted archive files (e.g. password-protected ZIP files), and these are becoming more and more popular. Largescale deployment of fingerprinting technology would push the popularity of all kinds of encryption and render the whole technology useless as a countermeasure.&#8221;</em></p>
<p>This ties in with what we said last year about <a href="http://torrentfreak.com/copysense-sleek-predator-or-white-elephant-080926/">such systems</a> and BitTorrent. These methods are highly ineffective.</p>
<p><strong>DRM</strong></p>
<p style="padding-left: 30px;"><em>&#8220;In the past, any DRM mechanism was hacked or otherwise circumvented. This is highly likely to happen to new systems as well.&#8221;</em></p>
<p>DRM doesn&#8217;t work, and has not worked. One person breaching it is all it takes, thanks to the Internet. <a href="http://torrentfreak.com/spore-most-pirated-game-ever-thanks-to-drm-080913/">Spore</a> is a great example of how DRM <a href="http://torrentfreak.com/ubisofts-no-cd-answer-to-drm-080718/">only affects legitimate purchasers</a>, and not the people it attempts to target.  </p>
<p><strong>The Summary</strong></p>
<p style="padding-left: 30px;"><em>&#8220;First, and most importantly, content providers need to provide other high-quality, well priced and easily accessible online content. New business models are inevitable. In the long run, this will make illegitimate sharing of copyright-protected material through the Internet a lot less interesting.&#8221;</em></p>
<p>This is the crux. It&#8217;s why rights owners are burying their heads in the sand, in the hope it will go away. It&#8217;s not surprising, however, that rights owners do not wish to move to a model that gives a smaller return-per-unit.</p>
<h2>The Bad</h2>
<p><strong>URL Whitelisting</strong></p>
<p style="padding-left: 30px;"><em>&#8220;An example is Ipoque’s BitTorrent tracker whitelisting, that allows access to guaranteed legal BitTorrent content, while blocking access to all other P2P content. This approach works because nearly all legal P2P content is distributed over BitTorrent using dedicated and controlled BitTorrent trackers.&#8221;</em></p>
<p>Simply banning a huge number of BitTorrent trackers because they are open to all users doesn&#8217;t seem to be a good idea. One of the most eye-opening things about P2P is the sheer wealth of data it gives access to. Some may be in violation of civil or criminal law, but a lot isn&#8217;t. The same applications that can be used to share a game, can be used to <a href="http://torrentfreak.com/frostwire-starts-artist-promotion-081210/">promote a band</a>, or distribute political protest by groups <a href="http://torrentfreak.com/michael-moore-on-slacker-uprisings-piracy-problem-081006/">large</a> and <a href="http://torrentfreak.com/bittorrent-uncensoring-to-independent-filmmakers-080109/">small</a>. </p>
<p><strong>Automatic detection tools</strong></p>
<p style="padding-left: 30px;"><em>&#8220;Such systems can detect infringements nationally and internationally. The location is not important. Especially automatic detection systems work highly efficiently and produce court-proof evidence data. This measure is very difficult to circumvent&#8221;</em></p>
<p>Yes, the only problem is that these tools are not very accurate. They target <a href="http://torrentfreak.com/dying-is-no-excuse-says-the-riaa/">dead people</a>, <a href="http://torrentfreak.com/study-reveals-reckless-anti-piracy-antics-080605/">printers</a>, those that have <a href="http://www.bbc.co.uk/blogs/watchdog/2008/12/davenport_lyons_threatening_le.html" target="_blank">never shared</a>, and everyone else falsely accused. Strangely, they point this out themselves 2 paragraphs earlier:</p>
<p style="padding-left: 30px;"><em>&#8220;Active monitoring has garnered a bad reputation because content providers have in the past often tried to criminalize copyright infringers and imposed ridiculous penalties as a deterrent. In addition, there have been flawed lawsuits with verdicts about persons with no Internet access. Careful investigation along with adequate penalties are necessary to improve the reputation of this measure&#8221;</em></p>
<h2>The Ugly</h2>
<p><strong>Using Exploits</strong></p>
<p style="padding-left: 30px;"><em>&#8220;As for any computer system, attacks are possible, and there are commercial providers offering this as a service. An attack on eDonkey, for instance, may have the effect that the downloaded file is larger than the original, and the download never finishes. There are similar attacks for BitTorrent.&#8221;</em></p>
<p>Using exploits in file-sharing networks and clients is of course insane. Moreover, depending on the vulnerabilities exploited, this could be a violation of criminal law. At best, as with the <a href="http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal" target="_blank">Sony Rootkits</a>, exploiting software systems like this is at least reputation-damaging.  Of course, there&#8217;s also&#8230;</p>
<h2>The G<strong>reat</strong>!</h2>
<p><strong>Encrypted communication</strong></p>
<p style="padding-left: 30px;"><em>&#8220;Encrypted communication and private file sharing networks can only be controlled by criminalistic methods involving a high effort.&#8221;</em></p>
<p>Again we applaud Ipoque for reaching the right conclusion. Not much we can say about this, except it&#8217;s the truth, and can&#8217;t be repeated often enough. </p>
<p> Is it a paper that is objective? Well, its the most objective one yet, but then that&#8217;s not saying much.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/anti-piracy-measures-dont-work-report-shows-090129/feed/</wfw:commentRss>
		<slash:comments>51</slash:comments>
		</item>
		<item>
		<title>All Major Canadian ISPs Slow Down P2P Traffic</title>
		<link>http://torrentfreak.com/all-major-canadian-isps-slow-down-p2p-traffic-090120/</link>
		<comments>http://torrentfreak.com/all-major-canadian-isps-slow-down-p2p-traffic-090120/#comments</comments>
		<pubDate>Tue, 20 Jan 2009 16:28:13 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[bell]]></category>
		<category><![CDATA[canada]]></category>
		<category><![CDATA[cogento]]></category>
		<category><![CDATA[dpi]]></category>
		<category><![CDATA[net neutrality]]></category>
		<category><![CDATA[rogers]]></category>
		<category><![CDATA[shaw]]></category>
		<category><![CDATA[traffic shahing]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=8956</guid>
		<description><![CDATA[Net neutrality really is the hot topic at the moment. After the FCC slapped Comcast for slowing down BitTorrent users, Canada is now looking into the network management practices of its ISPs. And rightly so, as a CRTC investigation reveals that most of the ISPs in Canada actively slow down customers using P2P applications.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/throttle.jpg" align="right" alt="bell">Ignited by the <a href="http://torrentfreak.com/comcast-vs-bittorrent-whats-next-080821/">Comcast fiasco</a> in the US, the concept of net neutrality has certainly been brought into the mainstream. ISPs are rarely transparent when it comes to their throttling, capping and otherwise interfering behavior, but in Canada they had to come clean due to a CRTC investigation.</p>
<p>The Canadian Radio, Television and Telecommunications Commission (<a href="http://www.crtc.gc.ca/eng/welcome.htm">CRTC</a>) is currently <a href="http://www.crtc.gc.ca/RapidsCCM/Register.asp?lang=E">looking into</a> the traffic management practices of Canadian ISPs, which came to a head as a result of a <a href="http://www.michaelgeist.ca/content/view/2811/125/">dispute</a> between CAIP, and its wholesale provider, Bell. The core objectives of the investigation are to examine the Internet traffic management practices being used, and check that they are in accordance with the Telecommunications Act.</p>
<p>The CRTC is looking at the effects of filtering on both regular customers and wholesalers, and the results of the first round of questions are just in. Even though some of the responses are filed in confidence (<a href="http://www.christopher-parsons.com/blog/archives/370#comment-463">summarized</a> by Chris Parsons), there is enough information to conclude that all major ISPs slow down customers, with most specifically targeting peer-to-peer traffic. </p>
<p>In their response to the CRTC investigation, Bell, Cogeco, Rogers and Eastlink all admit to slow down P2P traffic, arguing that it negatively affects network performance. Shaw, one of the other big players, admitted that customers are slowed down, but most of its responses were filed in confidence and P2P was not specifically mentioned.</p>
<p>Bell was more open about its practices, and admits using deep packet inspection (<a href="http://torrentfreak.com/deep-packet-inspection-080629/">DPI</a>) to throttle its individual customers and wholesalers. On Bell Wireline, P2P traffic is slowed down between 4.30 PM and 2 AM. To cope with the increasing bandwidth demands of its customers, they further plan to disconnect heavy users and introduce metered plans where customers pay for the bandwidth they use.</p>
<p>Cogeco started to throttle P2P users back in 2001, when they were only using a tiny fraction of what they do now. However, it was seen as necessary because of the increasing load these users put on the network. Like other ISPs, Cogeco considered other options such as metered plans, but these would not solve the network &#8216;abuse&#8217; by P2P users. Furthermore, the ongoing battle with P2P users who strive to evade their management solutions led the ISP to use deep packet inspection (<a href="http://en.wikipedia.org/wiki/Deep_packet_inspection">DPI</a>) as well.</p>
<p>Rogers claims it has to throttle P2P users to prevent their network from becoming &#8220;the world’s buffet,&#8221; as they like to call it. Not only does this affect their network, their bandwidth bills also increased due to the growing popularity of BitTorrent and other filesharing networks. Similar to Bell and Cogeco, Rogers is also known to use DPI. Upstream P2P traffic is slowed down across their entire network, regardless of congestion,</p>
<p>Shaw filed most of its answers in confidence, but provided a rather paradoxical statement which clearly shows that they slow down upstream traffic. &#8220;The traffic management technologies have reduced the rate of upstream consumption to a more manageable rate,&#8221; they write, claiming that this allows their customers to reach their full contract speeds. Similar to the other ISPs Shaw is predicting that bandwidth usage will grow, and that traffic shaping is essential to manage their network.</p>
<p>In summary, we can conclude that there is no such thing as <a href="http://saveournet.ca/">net neutrality in Canada</a>. All of the larger ISPs slow down their customers, with most of them specifically targeting P2P traffic through deep packet inspection. Because of this, P2P users can&#8217;t enjoy the speeds they were promised, and several legitimate businesses whose income depends on delivering content through BitTorrent or other filesharing networks are unable to compete with those who don&#8217;t. It&#8217;s now up to the CRTC to draw the right conclusions.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/all-major-canadian-isps-slow-down-p2p-traffic-090120/feed/</wfw:commentRss>
		<slash:comments>97</slash:comments>
		</item>
		<item>
		<title>Deep Packet Inspection and Your Privacy Online</title>
		<link>http://torrentfreak.com/deep-packet-inspection-080629/</link>
		<comments>http://torrentfreak.com/deep-packet-inspection-080629/#comments</comments>
		<pubDate>Sun, 29 Jun 2008 16:42:01 +0000</pubDate>
		<dc:creator><![CDATA[Ben Jones]]></dc:creator>
				<category><![CDATA[Web Stuff]]></category>
		<category><![CDATA[charter]]></category>
		<category><![CDATA[dpi]]></category>
		<category><![CDATA[hanff]]></category>
		<category><![CDATA[protest]]></category>
		<category><![CDATA[throttling]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=2911</guid>
		<description><![CDATA[The Internet is a world penitentially embroiled in a Cold War. Now, as then, an arms race between factions is constantly ongoing, each working to counter the efforts of the other. Into this race, comes deep packet inspection, a serious threat to online privacy.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>When I say Cold War, it&#8217;s not just an a reference thrown up to thrown up to invoke emotion. Like the real Cold War, it is mainly fought by proxy, one side using a third party to score hits. However, unlike the Cold War, it is not a contest between two fairly equal forces. One side has money and power, and the <a href="http://torrentfreak.com/riaa-and-mpaa-fund-anti-piracy-politicians/">will</a> to use it. The other has sheer weight of numbers, but what seems like general apathy.</p>
<p>One of the new weapons in this conflict, is called &#8216;<a href="http://en.wikipedia.org/wiki/Deep_packet_inspection" target="_blank">Deep Packet Inspection</a>&#8216; (DPI). An innocuous sounding name for a technology that basically means &#8216;Internet monitoring&#8217;. Deep packet inspection is a technology that some companies are salivating over, including advertisers and entertainment lobby groups like the MPAA. With it, their dreams can come true, some of them anyway.</p>
<p>There are various uses for deep packet inspection, such as its use by intelligence agencies (It&#8217;s a wiretap for the Internet) to intercept email and other web traffic,Â likeÂ inÂ <a href="http://torrentfreak.com/swedes-to-be-wiretapped-despite-protests-080619/">Sweden</a>. However, there are two more sinister usages being rolled out that are not so good for the everyday Internet user.</p>
<p>With the ability to see the contents of data packets, it&#8217;s no surprise that it&#8217;s a prime candidate for <a href="http://www.proceranetworks.com/press-releases/mobile-broadband-operator-yoigo-chooses-procera-networks-039-evolved-dpi-for-bandwidth-and-service-manag.html" target="_blank">traffic shaping</a> and throttling. With ISP&#8217;s increasingly overselling their capacity, they are starting to spend money not on infrastructure, <a href="http://telephonyonline.com/broadband/technology/dpi_content_video_110707/" target="_blank">but on DPI equipment</a>, to throttle BitTorrent traffic for example. Until recently, the processing power required to inspect data packets has made this prohibitive, as it required massive computers, and significantly slowed down network traffic. Now, though, companies like Procera Networks are selling systems capable of DPI on <a href="http://arstechnica.com/news.ars/post/20080512-throttle-5m-p2p-users-in-real-time-with-800000-dpi-monster.html" target="_blank">40Gbps of traffic</a>, per system. Think <a href="http://torrentfreak.com/comcast-throttles-bittorrent-traffic-seeding-impossible/">Sandvine</a>, without the telltale RST packets.</p>
<p>The MPAA loves the <a href="http://gullfoss2.fcc.gov/prod/ecfs/retrieve.cgi?native_or_pdf=pdf&amp;id_document=6519529325" target="_blank">idea</a> of DPI as well. It,Â likeÂ otherÂ groups, figure, that if people can see the contents of packets, that it can tell if those packets contain copyrighted data. Of course, they&#8217;re oblivious to the idea that their material can be used in a non-infringing way, and staunchly against fair use (and don&#8217;t forget, <a href="http://torrentfreak.com/3rd-annual-fair-use-day-arrives/">Fair Use Day</a> is only a week or two away). If this becomes a popular view, though, we may see multi-part rar files in torrents growing in popularity again.</p>
<p>The other, arguably more sinister usage of DPI, is the growing interest by advertising companies to use deep packet inspection to observe what Internet users are doing. Watching your browsing activity, you can gain all kinds of insights into the user behind the keyboard. Similar to spyware, but on your line not your system, it&#8217;s not a good thing, and impossible to remove. Worse, it may be able to tell who is behind the keyboard at the time, by identifying trends in connection behavior. In the case of a p2p lawsuit, these DPI-based advertising companies may end up being called to testify who their systems believe to be behind the keyboard at the time of the allegations.</p>
<p>With British Telecom in the UK having experimented with DPI based advertising , without telling the subscribers about it , and with Charter in the US looking into trialling it (or as has just been announced &#8211; <a href="http://blog.wired.com/27bstroke6/2008/06/charter-freezes.html" target="_blank">discouraged</a> from it) it is a pressing concern. Fortunately, some people are not exhibiting the apathy mentioned above, and are doing something about it. Alex Hanff (you might remember his <a href="http://torrentfreak.com/mpaa-drops-bittorrent-case-080503/">tangle with the MPAA</a>) has been studiously working against the likes of Phorm, and indeed, we linked to his <a href="http://www.paladine.org.uk/phorm_paper.pdf" target="_blank">dissertation</a> on it last time. He is holding a <a href="https://nodpi.org/2008/05/30/barbican-protest-rally-provisional-plan/" target="_blank">protest</a> outside British Telecom&#8217;s AGM next month, to protest this rape of user&#8217;s privacy for commercial gain.</p>
<p style="text-align: center;"><a href="http://www.nodpi.org" target="_blank"><img class="aligncenter" style="vertical-align: middle;" src="http://torrentfreak.com/images/nodpi-small.png" alt="no-DPI banner" width="500" height="100"></a></p>
<p>While the protest might be mainly against advertising based systems, it&#8217;s a worry for all net users, and needs to be dealt with by something other than apathy. At least one torrent site admin has told me he will be thereÂ and I may be there, but the more that attend, the better. So, users of the world, it&#8217;s time to start acting for what you believe in, and stop just moaning about it.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/deep-packet-inspection-080629/feed/</wfw:commentRss>
		<slash:comments>65</slash:comments>
		</item>
	</channel>
</rss>
