Jump to content

Protocol Encryption


opus44

Recommended Posts

Traffic shaping is not the problem. Comcast was ordered to stop traffic shaping by deep packet inspection and they no longer block traffic for P2P networks by that means. Starting January 1st, they control traffic by throttling back on you bandwith when you exceed 80% of you max speed for 15 minutes. They hold your speed down to 50% for 15 minutes. If you are still uploading or download at that rate after 15 minutes they hold you down until you stop using so much bandwidth. Finally they capped everyone's usage to 250GB per month. More than that is considered abuse and they say they will discontinue your service.

What someone claiming to be the copyright owner did was discover that I had downloaded a torrent file. They knew the name, date, time, and port number that was used. The only thing they didn't tell me was the tracker that I used.

My question is will uTorrent's encryption stop them from discovering what I'm downloading?

Re:

Notice of Action under the Digital Millennium Copyright Act

Abuse Incident Number: NA0000008718952

Report Date/Time: Tue, 20 Jan 2009 00:57:21 -0500

<deleted>

Copyright work(s) identified in the notification of claimed infringement:

Infringing Work: Seven Pounds

First Found: 17 Jan 2009 06:34:00 EST (GMT -0500)

Last Found: 17 Jan 2009 06:34:00 EST (GMT -0500)

IP Address: 98.211.7.109

IP Port: 49154

Protocol: BitTorrent

Torrent InfoHash: 4A1422103E97D9F9A0D36069AFAF9EA318030158

Containing file(s):

seven pounds.[2008.Eng].DVDScr.DivX-LTT.torrent (952,085,269 bytes)

Infringing Work: Seven Pounds

First Found: 17 Jan 2009 06:34:00 EST (GMT -0500)

Last Found: 17 Jan 2009 06:34:00 EST (GMT -0500)

IP Address: 98.211.7.109

IP Port: 49154

Protocol: BitTorrent

Torrent InfoHash: 4A1422103E97D9F9A0D36069AFAF9EA318030158

Containing file(s):

seven pounds.[2008.Eng].DVDScr.DivX-LTT.torrent (952,085,269 bytes)

Link to comment
Share on other sites

Thanks.

Re:

"This feature does NOT provide anonymity and only very limited confidentiality, i.e. if somebody is in possession of the correct infohash he can obtain your IP/Port combination from public sources like a tracker or from other clients via PEX he will be able to connect to you as usual. Only a passive listener can't determine what you're downloading." http://azureuswiki.com/index.php/Avoid_traffic_shaping

That answers that. =)

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...