background preloader

DPI

Facebook Twitter

Milton Mueller

Deep Packet Inspection et démocratie : c’est l’un ou l’autre. Pour préserver le coté chic des plages de Long Island, là où les millionnaires New Yorkais se doivent d’avoir une résidence secondaire, Robert Moses, l’architecte en chef des viaducs pour l’aménagement du territoire américain, avait une solution simple : les véhicules dépassant une certaine hauteur ne pouvaient les franchir.

Grace à cet astucieuse trouvaille, seuls les véhicules particuliers étaient en mesure d’accéder à Long Island, les bus, eux, ne pouvaient traverser le viaduc menant à ses superbes plages, et par la même occasion les pauvres, qui à l’époque n’avaient pas encore accès aux transports individuels. Cette anecdote résume bien la façon dont des choix architecturaux peuvent avoir un impact social fort.

Il en est de même concernant les choix d’architecture du réseau internet, et c’est un enjeux essentiel pour le monde du XXIe siècle. Le Deep Packet Inspection offre donc aux démocraties une alternative à la censure. It is inevitable, Mister Anderson. L'Iran aurait réussi à bloquer Tor provisoirement. Il ne s'agit pas heureusement d'un déchiffrement du contenu des communications, mais simplement d'une identification des données véhiculées par le protocole Tor.

Ce qui est déjà en soit un petit exploit technologique. Selon les informations du Daily Telegraph reprises par Le Point, l'Iran aurait en effet réussi ces dernières semaines à couper les seules communications chiffrées établies avec Tor, sans toucher aux autres communications chiffrées comme celles employées par les systèmes de paiement en ligne. Exploité notamment par le plugin HTTPS Everywhere de l'EFF (mise à jour : erreur de notre part, voyez les explications d'Arkados dans les commentaires), Tor effectue un "routage en oignon" qui assure un certain niveau de protection de l'anonymat aux journalistes et aux opposants de Mahmud Ahmadinejad. Les communications établies avec Tor sont relayées par de multiples rebonds, de sorte qu'il est impossible de savoir quelle adresse IP était utilisée à l'origine de la communication. Untitled. Recherche, sciences et techniques : neutralité de l'internet. WikiLeaks brings to light suspected baby trafficking from Egypt to Canada.

The RCMP and Canadian consular officials in Cairo have been investigating up to a dozen cases where couples are suspected of having trafficked babies from Egypt into Canada, according to leaked diplomatic cables. The details are outlined in American embassy dispatches made public this week by WikiLeaks. Some of the suspected cases involve priests of the Coptic Christian community in Egypt, who are trying to find homes for street children but run into Egypt's Islamic law, which bans adoption, according to a spokesman in Canada.

The crackdown began after American and Egyptian investigators dismantled a ring that used false birth-registration papers to bring babies to the United States, arresting 10 people, including two U.S. citizens, said a February, 2009 cable from the U.S. Cairo embassy. "Further close cooperation with the RCMP will be important in identifying cases that may have used Canada as a means to enter the United States. " Adoption by foreigners is almost impossible in Egypt. What Is Deep Packet Inspection and Why the Controversy? « NetEqualizer News Blog. By Art Reisman Editor’s note: Art Reisman is the CTO of APconnections. APconnections designs and manufactures the popular NetEqualizer bandwidth shaper. APconnections removed all deep packet inspection technology from their NetEqualizer product over 2 years ago.

Article Updated March 2012 As the debate over Deep Packet Inspection continues, network administrators are often faced with a difficult decision: ensure network quality or protect user privacy. However, the legality of the practice is now being called into question, adding a new twist to the mix. Yet, for many Internet users, deep packet inspection continues to be an ambiguous term in need of explanation.

Exactly what is deep packet inspection? All traffic on the Internet travels around in what is called an IP packet. The string of characters on the inside of the packet can be conceptually thought of as the “payload,” much like the freight inside of a railroad car. How is deep packet inspection related to net neutrality? Like this: Contest: Tell Us About Your Road to the Cloud and Win a MacBook Air - ReadWriteCloud. Today we're thrilled to announce the Road to the Cloud Contest.

Thanks to our sponsors, we're giving out a MacBook Air every month though the end of the year to those in our community with the most well-thought-out views about the road to adopting cloud computing. It's our first contest on ReadWriteCloud so it's pretty exciting for us. RWCloud has been around now for more than a year. And it has been a great ride as we've come to know the mosaic that this massive cloud computing ecosystem represents.

But still it seems at times that the basics get overlooked too often. We can get caught up in the newest services and overlook the essentials that are fundamental to adopting cloud computing. Add vendor noise and the result is plenty of confusion for the ordinary customer. The road to cloud computing is a multi-step process. And so for our first topic, we'd like your thoughts about the critical issues to consider when starting on that journey. We look forward to the conversation! Al-JAZEERA: MUBARAK HAS LEFT EGYPT FOR THE UAE. FRANCE 24 - Les autorités verrouillent Alger pour empêcher l'opposition de manifester. Publié le : 12/02/2011 - 10:37Modifié le : 12/02/2011 - 22:16 , envoyé spécial à Alger – Des milliers de membres des forces de sécurité ont investi le centre d'Alger où l'opposition a bravé l'interdiction de manifester pour organiser une marche pacifiste.

Objectif affiché : "changer le système". "Alger la blanche" a pris ce matin la couleur bleue. Plus 35 000 policiers anti-émeutes, selon le président du RCD, Saïd Saadi, ont investi dès les premières heures de jour les principales artères de la capitale et quadrillé la ville. Quelque 2 000 personnes ont tenté de marcher samedi matin à Alger à l'appel de l'opposition pour "changer le système" mais ont été bloquées très rapidement par un très important dispositif des forces de l'ordre qui ont procédé à des interpellations musclées. Ce samedi, en milieu de matinée, les habitants sont arrivés par petits groupes sur la place du 1er Mai. Un parcours verrouillé par les forces de l’ordre. Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant | Threat Level. Graphic showing clusters of Stuxnet infections during targeted attacks launched in 2009 and 2010. Courtesy of Symantec. Attackers behind the Stuxnet computer worm focused on targeting five organizations in Iran that they believed would get them to their final target in that country, according to a new report from security researchers.

The five organizations, believed to be the first that were infected with the worm, were targeted in five separate attacks over a number of months in 2009 and 2010, before Stuxnet was discovered in June 2010 and publicly exposed. Stuxnet spread from these organizations into other organizations on its way to its final target, which is believed to have been a nuclear enrichment facility or facilities in Iran. “These five organizations were infected, and from those five computers Stuxnet spread out — not to just computers in those organizations, but to other computers as well,” says Liam O Murchu, manager of operations for Symantec Security Response.

See also: Clarinette: "RT @glynmoody: Revealed: how ..." « Deck.ly. CBS News' Lara Logan Assaulted During Egypt Protests - 60 Minutes. L'Hadopi affirme que l'adresse IP n'est pas une donnée personnelle. Ce mercredi matin, nous révélions que la Haute Autorité pour la diffusion des œuvres et la protection des droits sur Internet (Hadopi) refuse de transmettre leur PV aux abonnés avertis, au motif étrange qu'il n'y aurait pas de donnée personnelle sur le procès verbal dressé par les agents assermentés des ayants droit.

Ce qui ne pouvait dire que deux choses. Soit que le PV ne fait pas figurer l'adresse IP de l'abonné, ce qui était hautement improbable. Soit, comme nous en avons eu la confirmation, que l'Hadopi considère que l'adresse IP n'est pas une donnée personnelle. Contactée en début de matinée, la présidente de la Commission de protection des droits de l'Hadopi Mirelle Imbert-Quaretta nous a rappelé en milieu de journée pour nous apporter ses explications. Elle nous confirme son refus de transmettre les PV aux personnes concernées, au motif que l'adresse IP qui y figure ne serait pas une donnée personnelle. "C'est la jurisprudence de la Cour de cassation", nous a-t-elle affirmé. Clarinette: "RT @AntoninPribetic: New Post: ..." « Deck.ly. 1Esfand Tehran Protest Locations. Clarinette: "=@Dima_Khatib Khaddafi, as a ..." « Deck.ly.

Clarinette: "RT @Dima_Khatib: Libya's lobbyist: ..." « Deck.ly. Blogoir: Libya: What Is To be Done? Update: welcome Guido readers Imagine you are William Hague or Hillary Clinton, pressed with a real sense of wanting to Do Something to help the Libyan masses. You draw a noisy stick across the bars of the FCO/State Department cage to rouse the bemused and sulky inmates, and demand ideas for action. What might they serve up? "Basically", they'll primly reply, "You politicians have to accept that there are subtle/difficult trade-offs and hard choices to be made between Breadth v Depth, Fast v Slow, Big Impact v Less Impact, More Certain Impact v Less Certain Impact, Risky v Not-so-Risky, Legal v Not-so-Legal, and so on. " "Oh, and did we mention Cheap v Expensive? " And having got that off their clever chests, if they are smart they'll produce something like the following Options Menu Indirectly Limiting the Regime's Power Economic Sanctions: general economic sanctions are Big, Slow and tend to empower the regime if it is secure enough.

Key idea, never known to fail: Divide and Rule. Fine. Dan Mirvish: The Hathaway Effect: How Anne Gives Warren Buffet a Rise.

DPI use in Egypt internet censoring

Rogers' New Throttling System Cripples Speeds - And inadvertently impacting non-P2P applications. Rogers is PITA My inlaws live in Toronto, (me UNY) so they were essentially paying $40/month for 2/384k and capped at 20 GB, and speeds and quality were all over the place. Now they talk about Netflix in Canada, and I say watch out because you will have a VZW wireless moment if you try to use it. My inlaws are in their 70's and don't even know what 20GB is, but I do -- its a small fart. If that were offered in the US, they would be out of business because TBH that is like PURE MARGIN RIPOFF. There CS sucks BTW, big time and is quite rude (I have found Canadians have no concept of CS). Long story short, my inlaws moved to Bell (still kept voip.ms) and the link is way more steady and the VOIP is crystal clear.

The rogers guy even told my parents that their phone was land line, and I laughed and looked at the VOIP box sitting in the basement and told them that if the cable were off, the phone would not work. Netflix -> Hell for Canadians. Phorm and DPI: Alex Hanff. Is deep-packet inspection a criminal offence? "These are not the packets you are looking for" Things are heating up in the fight against piracy in the UK.

Virgin Media has announced that it will use deep packet inspection (DPI) software to analyse whether its customers are sharing copyright infringing material. Privacy International has brought this practice to the attention of both the European Commission and the Information Commissioner, who are looking into the affair. But most interestingly, Privacy International has also threatened to report Virgin Media to the Metropolitan Police for contravening the Regulation of Investigatory Powers Act (RIPA, yes, the acronym does sound like a flesh-eating dinosaur, or a killer robot). It seems clear that Virgin’s DPI system is similar to our old friend Phorm, and the European Commission has already made it clear that it considers such technologies as interception, and that clear customer consent is required in such cases. Deep packet inspection engine goes open source. Deep packet inspection (DPI) hardware can identify an astonishing array of protocols passing across the Internet—up to and including protocols that are rare even to us in the Orbiting HQ (Gadu-Gadu?

Manolito? Feidian?). But if you've ever wondered just how this can be done, and done at wire speed, wonder no more: Europe's leading DPI vendor has open-sourced a version of its traffic detection engine. OpenDPI.org is the new home for ipoque's open source project; anyone interested can take a look at the code or contribute patches. The goal in this case, though, isn't so much about crowdsourcing product development but about easing consumer fears about DPI technology. Klaus Mochalski, CEO of ipoque, explains that "transparency was important for us from the beginning. The OpenDPI engine, released under the LGPL license, differs from ipoque's commercial scanning engine in its high-priced DPI hardware. The OpenDPI engine will identify a huge list of non-encrypted protocols, however: No Deep Packet Inspection.

Deep Packet Inspection and Privacy. Does “Deep Packet Inspection” Turn You On?Becky Lentz / McGill U. Example of an x-ray body scan at an airport Does “Deep Packet Inspection” turn you on? Didn’t think so. And you’re wondering, ‘what’s that’? Hang in there. I’ll get to that in a minute. Even though many economic, financial, political, and social activities depend on access to telecommunication infrastructure such as the Internet, telecommunication scholarship and policymaking remain opaque practices because of their technical orientation and focus mostly on infrastructure issues, anti-trust and competition regulation.

And this leads me to the issue of deep packet inspection (DPI, for short). Deep packet inspection is a stellar example of obscure, and as I argue here, misleading (perhaps even tacitly deceptive) telecommunication policy discourse. Q&A: Ken Auletta Contrary to what its name might lead you to believe, “deep packet inspection” is neither a sex toy, nor a cattle prod. And what about the same problem in law: soft law (regulation) and hard law (legislation). Image Credits: 1. Appeals Court Throttles FCC’s Net Neutrality Authority | Threat. A federal appeals court Tuesday rejected the Federal Communications Commission’s authority to sanction Comcast for interfering with peer-to-peer traffic, reversing the commission’s first attempt to enforce network neutrality.

The U.S. Court of Appeals for the District of Columbia Circuit vacated (.pdf) the agency’s 2008 decision ordering Philadelphia-based Comcast to stop hampering the peer-to-peer service BitTorrent as a traffic-management practice. The FCC had acted in response to complaints Comcast was sending forged packets to broadband customers to close their peer-to-peer sessions. Comcast appealed to the circuit court, arguing that the FCC overstepped its bounds. FCC Chairman Kevin Martin’s replacement, Julius Genachowski, proposed new rules last year that the agency was hoping would sidestep an unfavorable circuit decision. “Today’s court decision invalidated the prior commission’s approach to preserving an open internet,” FCC spokesman Jen Howard said in a statement.

Rep. Office of the Privacy Commissioner – Deep Packet Inspection. How does society reconcile the technological benefits and privacy impacts of new technology? Deep packet inspection is just one seemingly neutral technological application that can have a significant impact on privacy rights and other basic civil liberties, especially as market forces, the enthusiasm of technologists and the influence of national security interests grow stronger. In the summer and fall of 2008, the Office of the Privacy Commissioner of Canada contacted leading academics and professionals working in telecommunications, law, privacy, civil liberties and computer science to ask if they would contribute a short essay on DPI to a project tor create a resource on deep packet inspection.

This web page presents the work of these academics, lawyers, researchers, activists and industry professionals. We value the time they invested in preparing their essays, and we hope that it will encourage further discussion around deep packet inspection and similar technologies. No Snooping - Design Issues. Technology, Thoughts, and Trinkets» Archives.

Technology, Thoughts, and Trinkets» COUNTER: Counterfeiting and. Technology, Thoughts, and Trinkets» Choosing Winners with Deep P. Technology, Thoughts, and Trinkets» Deep Packet Inspection Canad. Technology, Thoughts, and Trinkets» Twitter, Mobile Browsers, an. Technology, Thoughts, and Trinkets» Virgin to Use DPI to ID Copy. DPI – Disruptive and Controversial. Can Virgin Media DPI spy app ID users? Does virgin media police itself first? Virgin Media and another illegal DPI software (testmy.net) EU investigating legality of Virgin ISP spying on its customers. ISPreview UK - Independent Internet Service Provider Information. Virgin want to sniff your packets :: Virgin Media (Cable) :: thi. Lightreading Policy, DPI & the Mobile Packet Core Event (CTIA) Virgin Media Using Deep Packet Inspection To Spy On Your Interne.

Deep Packet Inspection: Reading List and Call for Papers. Phorm Pops Up Again, This Time in Brazil. DPI as an Integrated Technology of Control – Potential and Reali. Objecting to Phorm « Office of the Privacy Commissioner – Deep P. Transport and Tracking « Office of the Privacy Commissioner – De. Phorm: A New Paradigm in Internet Advertising « Office of the Pr.

The Privacy Implications of Deep Packet Inspection « Office of t. The Greatest Threat to Privacy « Office of the Privacy Commissio. Deep Packet Inspection – Bring It On « Office of the Privacy Com. Badware and DPI « Office of the Privacy Commissioner – Deep Pack. Review of the Internet traffic management practices of Internet. An Inaccurate Analogy: “DPI is equivalent to the postal service. Privacy activist "will quit job to take on Virgin Media" | News. Deep Packet Inspection Canada. Meets the Department for Business, Innovation and Skills | No De.

Deep Packet Inspection