<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; traffic-shaping</title>
	<atom:link href="http://torrentfreak.com/tag/traffic-shaping/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 19:18:38 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>&#8216;Shocking&#8217; 61% of all Upstream Internet Traffic is P2P</title>
		<link>http://torrentfreak.com/shocking-61-of-all-upstream-internet-traffic-is-p2p-081021/</link>
		<comments>http://torrentfreak.com/shocking-61-of-all-upstream-internet-traffic-is-p2p-081021/#comments</comments>
		<pubDate>Tue, 21 Oct 2008 16:37:12 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[p2p]]></category>
		<category><![CDATA[sandvine]]></category>
		<category><![CDATA[traffic-shaping]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=5858</guid>
		<description><![CDATA[Sandvine, best known for manufacturing the hardware that slowed down BitTorrent users on Comcast, has released an Internet traffic trends report today. The report shows that, on average, P2P traffic is responsible for more than half of the upstream traffic, but mostly the report seems an attempt to sell their traffic shaping products.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Over the years, many Internet traffic reports have been published. Back in 2004, long before the BitTorrent boom had started, studies already indicated that BitTorrent was responsible <a href="http://yro.slashdot.org/yro/04/11/04/1749257.shtml?tid=99&#038;tid=17">for an impressive 35%</a> of all Internet traffic.</p>
<p>Since then, we&#8217;ve seen a couple of dozen reports, all with a totally different outcome. Some estimate that P2P traffic represents approximately 50% of the total traffic, while others go as high as 85%, or as low as 20%. The overall consensus seems to be that there is little consensus, or is there?</p>
<p>We think we might have spotted a trend, not so much in the data, but in the companies that publish these reports. Most Internet traffic research is conducted by companies that offer traffic shaping and broadband management solutions. <a href="http://torrentfreak.com/search/cachelogic">Cachelogic</a>, <a href="http://www.ipoque.com/">Ipoque</a>, <a href="http://www.sandvine.com/">Sandvine</a>, they all sell (or sold) products that help ISPs to manage their traffic.</p>
<p>Consequently, it is not a big surprise that their presentation of the results is often a little biased. After all, it is in their best interests to overestimate the devastating effects P2P traffic has, and convince ISPs that they need to throttle these awful bandwidth hogs.</p>
<p>Or as Sandvine co-founder Dave Caputo <a href="http://www.sandvine.com/news/pr_detail.asp?ID=203">puts it</a>: “Bulk bandwidth applications like P2P are on all day, everyday and are unaffected by changes to network utilization. This reinforces the importance of protecting real-time applications that are sensitive to jitter and latency during times of peak usage.&#8221;</p>
<p>In Sandvine&#8217;s report we see that P2P represents less than a quarter of all downstream traffic, and even less during peak times. Web traffic is most dominant and online media streaming sites take up nearly 16%.</p>
<p><img src="http://torrentfreak.com/images/sandvine-downsteam.jpg" alt="downstream"></p>
<p>On the upstream side, P2P traffic takes up 61% of all traffic (the black makes it even more scary), followed by web-browsing, tunneling and VoIP traffic.</p>
<p><img src="http://torrentfreak.com/images/sandvine-upstream.jpg" alt="upstream"></p>
<p>Interestingly, the amount of bandwidth that is transferred on the Internet has more than quadrupled since the first reports came out a few years ago, and it is likely to quadruple again in only a few years. Unlike Sandvine suggests, throttling is not the solution. Investing in the network is.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/shocking-61-of-all-upstream-internet-traffic-is-p2p-081021/feed/</wfw:commentRss>
		<slash:comments>66</slash:comments>
		</item>
		<item>
		<title>BitTorrent Encryption Confuses the BPI, ISPs and Journalists Who Don&#8217;t Research</title>
		<link>http://torrentfreak.com/bittorrent-encryption-myths-071108/</link>
		<comments>http://torrentfreak.com/bittorrent-encryption-myths-071108/#comments</comments>
		<pubDate>Thu, 08 Nov 2007 23:21:06 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[encrypyion]]></category>
		<category><![CDATA[traffic-shaping]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/bittorrent-encryption-myths-071108/</guid>
		<description><![CDATA[A recently published article by <a href="http://www.theregister.co.uk/2007/11/08/bittorrent_encryption_explosion/">The Register</a> claims that an increase in encrypted BitTorrent traffic is due to the fact that people want to hide or scramble the files they are sharing. Apparently some tech journalists, and in particular the anti-piracy organizations, have no clue what BitTorrent encryption actually does. <p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com//images/dummies.jpg" align="right" alt="">Encrypted BitTorrent traffic now accounts for 40% of all BitTorrent traffic in the UK according to the article. The Register claims that filesharers use encryption to scramble their data so they can protect themselves from being caught, and the comments from a music industry representative make it seem like people can indeed hide what they are sharing. Unfortunately, none of it is true</p>
<p>This is what Matt Phillips, of the record industry trade association the British Phonographic Institute told the Register: &#8220;Our internet investigations team, internet service providers and the police are well aware of encryption technology: it&#8217;s been around for a long time and is commonplace in other areas of internet crime. It should come as no surprise that if people think they can hide illegal activity they will attempt to.&#8221;</p>
<p>So if it&#8217;s not hiding anything, why do people use BitTorrent encryption then?</p>
<p>I&#8217;ll try to explain it once more to the BPI, IFPI and RIAA and some tech journalists, just so they don&#8217;t embarrass themselves again in the future. <a href="http://en.wikipedia.org/wiki/BitTorrent_protocol_encryption">BitTorrent encryption</a> has nothing to do with hiding the data you&#8217;re sharing, it only hides the fact that you&#8217;re using BitTorrent to do so. </p>
<p>Encryption was <a href="http://torrentfreak.com/encrypting-bittorrent-to-take-out-traffic-shapers/">designed</a> to prevent ISPs from throttling BitTorrent traffic, which they started doing approximately 2 years ago. ISPs use so called traffic shaping devices to identify and slow down BitTorrent traffic because it takes up a lot of bandwidth (read: costs a lot of money). BitTorrent encryption, which is now supported by all the popular BitTorrent clients, hides the protocol header. As a result, these devices can&#8217;t detect that someone is using BitTorrent and you can download at full speed.</p>
<p>So, encryption <strong>does not hide the actual data people are sharing</strong>, everyone can still connect to a BitTorrent swarm, record your IP-address, and send you an infringement notice.</p>
<p>Now back to the claim that 40% of the BitTorrent traffic is encrypted in the UK. My first question would be, how do they know that it&#8217;s BitTorrent traffic if it&#8217;s encrypted? Apart from that I think 40% is a little too high, unless the ISP that reported the data is throttling BitTorrent traffic of course. We&#8217;ve been tracking the number of people who actually use encryption and it is currently slightly below 10%. It could be of course that these people are responsible for 40% of the traffic, but I seriously doubt that.</p>
<p>Bottom line is, anti-piracy organizations should take some time to read up on what filesharing actually is before they are going to accuse people of something, but I guess that&#8217;s wishful thinking.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/bittorrent-encryption-myths-071108/feed/</wfw:commentRss>
		<slash:comments>76</slash:comments>
		</item>
		<item>
		<title>Company Cracks BitTorrent Protocol Encryption and Introduces Tracker Whitelists</title>
		<link>http://torrentfreak.com/company-cracks-bittorrent-protocol-encryption-and-introduces-tracker-whitelists/</link>
		<comments>http://torrentfreak.com/company-cracks-bittorrent-protocol-encryption-and-introduces-tracker-whitelists/#comments</comments>
		<pubDate>Fri, 27 Apr 2007 20:23:16 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[DRM and Other Evil]]></category>
		<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[Azureus]]></category>
		<category><![CDATA[bandwidth-management]]></category>
		<category><![CDATA[Bittorrent Software]]></category>
		<category><![CDATA[bittorrent-tracker]]></category>
		<category><![CDATA[encrypted-transfers]]></category>
		<category><![CDATA[encrypted_-raffic]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[obfuscated]]></category>
		<category><![CDATA[rogers]]></category>
		<category><![CDATA[traffic-shaping]]></category>
		<category><![CDATA[utorrent]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/company-cracks-bittorrent-protocol-encryption-and-introduces-tracker-whitelists/</guid>
		<description><![CDATA[The BitTorrent bandwidth battle continues. <a href="http://www.ipoque.com/">Ipoque</a>, a German based company that specializes in developing bandwidth managing solutions for Universities and ISPs, announced today that their products are now able to detect and throttle encrypted BitTorrent traffic. In addition, they introduce the option to maintain a "whitelist" of <em>legal</em> BitTorrent trackers that are allowed on the monitored network. You could call it the PeerGuardian for ISPs.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com//images/ipoque.gif" align="right" alt="ipoque bittorrent traffic encrypt">Last year uTorrent and Azureus, two of the most popular BitTorrent clients implemented <a href="http://torrentfreak.com/encrypting-BitTorrent-to-take-out-traffic-shapers/">BitTorrent protocol encryption</a>. This successfully bypassed most traffic shaping devices that were used to slow down BitTorrent traffic. The topic led to a <a href="http://torrentfreak.com/traffic-shaping-good-or-bad/">heated discussion</a>, and the BitTorrent bandwidth battle took off. </p>
<p>In a response to the BitTorrent protocol encryption that is now supported by <a href="http://en.wikipedia.org/wiki/Comparison_of_BitTorrent_software">many BitTorrent clients</a>, companies like Ipoque that provide bandwidth management hardware, claim that they found a way to detect and block these encrypted (obfuscated) transfers. Ipoque doesn&#8217;t provide any details on how they are able to detect encrypted BitTorrent traffic, and it is doubtful whether they can be sure that the traffic they block is indeed generated by BitTorrent.</p>
<p>In addition to the ability to throttle encrypted BitTorrent transfers, Ipoque&#8217;s bandwidth managing devices now also support the use of BitTorrent tracker whitelists. &#8220;Desired legal trackers such as tracker.opensuse.org can be registered in a whitelist so that their BitTorrent traffic is accepted. All other BitTorrent traffic can be blocked.&#8221;, says Ipoque in a <a href="http://www.prweb.com/releases/2007/4/prweb521773.htm">press release</a>.</p>
<p>Lately, <a href="http://torrentfreak.com/netenforcer-throttles-encrypted-bittorrent-traffic/">more</a> and <a href="http://torrentfreak.com/bittorrent-friendly-bandwidth-throttler/">more</a> companies claim that they have found a way to detect encrypted BitTorrent traffic. The fact is however that none of these companies actually provides data on the effectiveness of these systems. Until they open up their methods I seriously doubt the effectiveness of these devices.</p>
<p>Interestingly, a few weeks ago, Canadian ISP Rogers even decided to <a href="http://torrentfreak.com/rogers-fighting-bittorrent-by-throttling-all-encrypted-transfers/">throttle all encrypted traffic</a> (not only BitTorrent). Apparently Rogers doesn&#8217;t need a device that is able to detect encrypted BitTorrent traffic on their network, they simply throttle everyone who is using encrypted transfers.</p>
<p><strong>The cat-and-mouse game continues.</strong></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/company-cracks-bittorrent-protocol-encryption-and-introduces-tracker-whitelists/feed/</wfw:commentRss>
		<slash:comments>22</slash:comments>
		</item>
		<item>
		<title>Emule Fights Throttling ISP&#8217;s</title>
		<link>http://torrentfreak.com/emule-fights-throttling-isps/</link>
		<comments>http://torrentfreak.com/emule-fights-throttling-isps/#comments</comments>
		<pubDate>Sat, 09 Sep 2006 20:45:18 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[emule]]></category>
		<category><![CDATA[encrypt]]></category>
		<category><![CDATA[encrypyion]]></category>
		<category><![CDATA[filesharing]]></category>
		<category><![CDATA[p2p]]></category>
		<category><![CDATA[traffic-shaping]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/emule-fights-throttling-isps/</guid>
		<description><![CDATA[The eMule team has released a new version of eMule, which supports protocol obfuscation, probably inspired by the success of encryption in several BitTorrent clients. This feature, which causes eMule&#8217;s communication to appear as random data and makes it more difficult for ISP&#8217;s to throttle eMule users. The new version has the option of only [&#8230;]<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The eMule team has released a new version of eMule, which supports protocol obfuscation, probably inspired by the success of encryption in several BitTorrent clients. This feature, which causes eMule&#8217;s communication to appear as random data and makes it more difficult for ISP&#8217;s to throttle eMule users.</p>
<p><img src="http://TorrentFreak.com//images/Emule.jpg" align="right" alt="emule">The new version has the option of only connecting to clients that support this feature but it has the option of connecting to all clients as well.</p>
<p>Protocol obfuscation has been the most requested feature by eMule users for several months. It has been reported that Brasil Telecom has been aggressively throttling traffic generated by eMule. This has made eMule practically unusable for thousands of Brazilian&#8217;s and although <a href="http://sourceforge.net/projects/neomule/">NeoMule</a>, an eMule mod, added protocol obfuscation several months ago it only partially alleviated the problem.</p>
<p>NeoMule users represent a very small percentage of the ed2k network and although their protocol obfuscation feature works well, it only works if the users it connects to are also using NeoMule.</p>
<p>Recently, more and more ISP&#8217;s have began throttling P2P protocols. Numerous ISP&#8217;s have targeted the BitTorrent protocol and in response Azureus, BitComet and uTorrent have <a href="http://TorrentFreak.com/encrypting-BitTorrent-to-take-out-traffic-shapers/">implemented protocol encryption</a>.</p>
<p>Overall, their protocol encryption feature has been effective but Allot Communications <a href="http://TorrentFreak.com/netenforcer-throttles-encrypted-BitTorrent-traffic/">claims</a> that they have developed technology that allows ISP&#8217;s to specifically target and throttle encrypted BitTorrent traffic.</p>
<p>It&#8217;s clear that eMule&#8217;s protocol obfuscation feature will be well received by the eMule community but it remains to be seen how long it will take for ISP&#8217;s to figure out a way to throttle eMule&#8217;s traffic once again.</p>
<p><a href="http://p2pnet.net">p2pnet</a></p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/emule-fights-throttling-isps/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>BitTorrent aids Terrorists and Pedophiles</title>
		<link>http://torrentfreak.com/bittorrent-aids-terrorists-and-pedophiles/</link>
		<comments>http://torrentfreak.com/bittorrent-aids-terrorists-and-pedophiles/#comments</comments>
		<pubDate>Tue, 28 Feb 2006 23:33:35 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[client]]></category>
		<category><![CDATA[Clients]]></category>
		<category><![CDATA[encrypt]]></category>
		<category><![CDATA[encrypyion]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[newsnight]]></category>
		<category><![CDATA[p2p]]></category>
		<category><![CDATA[traffic-shaping]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/bittorrent-aids-terrorists-and-pedophiles/</guid>
		<description><![CDATA[In Friday's edition of BBC's newsnight, BitTorrent is portrayed as the new evil that helps terrorists and pedophiles to do their "job" without being noticed. In a dramatic 4 minute report the public is led to believe that BitTorrent is a threat to (inter)national security. Unbelievable, see for yourself.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Sure, ISP&#8217;s <a href="http://TorrentFreak.com/encrypting-BitTorrent-to-take-out-traffic-shapers/">don&#8217;t like BitTorrents new gadget</a>, but what has this to do with terrorists and pedophiles. Newsnight makes it seem like encryption makes it impossible to track traffic and that all filesharers are thieves, which is absolute nonsense. In fact, Newsnight didn&#8217;t looked into the actual story at all, but they managed the get a comment from a former CIA officer, to &#8220;confirm&#8221; their story.</p>
<p>The edition of Newsnight in question led to a lot of critique, and today <font size="2"><span class="byl">Adam Livingstone </span><span class="byd">Newsnight&#8217;s Ubergeek tried to calm things down and <a href="http://news.bbc.co.uk/1/hi/programmes/newsnight/4758636.stm">made a public apology</a>. </span></font></p>
<blockquote><p><font size="2">First though, an apology. File sharing is not theft. It has never been theft. Anyone who says it is theft is wrong and has unthinkingly absorbed too many Recording Industry Association of America press releases. We know that script line was wrong. It was a mistake. We&#8217;re very, very sorry.</font></p></blockquote>
<p><font size="2"><span class="byd">Good to hear some wise words after all</span></font></p>
<p><a href="http://thepiratebay.org/details.php?id=3449560">Link to torrent</a> (non terrorists only)</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/bittorrent-aids-terrorists-and-pedophiles/feed/</wfw:commentRss>
		<slash:comments>22</slash:comments>
		</item>
	</channel>
</rss>
