{"id":4369,"date":"2008-02-15T19:01:05","date_gmt":"2008-02-16T02:01:05","guid":{"rendered":"http:\/\/bennett.com\/blog\/index.php\/archives\/2008\/02\/15\/bittorrentcomcast-cat-and-mouse-game-continues\/"},"modified":"2008-02-15T19:01:05","modified_gmt":"2008-02-16T02:01:05","slug":"bittorrentcomcast-cat-and-mouse-game-continues","status":"publish","type":"post","link":"https:\/\/bennett.com\/blog\/2008\/02\/15\/bittorrentcomcast-cat-and-mouse-game-continues\/","title":{"rendered":"BitTorrent\/Comcast Cat-and-Mouse Game Continues"},"content":{"rendered":"<p>\t\t\t\tThe infamous &#8220;Ernesto&#8221; announces new countermeasures to grab even more of <a href=\"http:\/\/torrentfreak.com\/bittorrent-devs-introduce-comcast-busting-encryption-080215\/\">Comcast&#8217;s residential network:<\/a><\/p>\n<blockquote><p>\nBitTorrent throttling is not a new phenomenon, ISPs have been doing it for years. When the first ISPs started to throttle BitTorrent traffic most BitTorrent clients introduced a countermeasure, namely, protocol header encryption. This was the beginning of an ongoing cat and mouse game between ISPs and BitTorrent client developers, which is about to enter new level.<\/p>\n<p>Unfortunately, protocol header encryption doesn\u00e2\u20ac\u2122t help against more aggressive forms of BitTorrent interference, like the Sandvine application used by Comcast. A new extension to the BitTorrent protocol is needed to stay ahead of the ISPs, and that is exactly what is happening right now.<\/p><\/blockquote>\n<p>As much fun as this sort of thing is, it&#8217;s not really going to work. Bram Cohen, the <a href=\"http:\/\/bramcohen.livejournal.com\/29886.html\">inventor of BitTorrent explains why<\/a>:<\/p>\n<blockquote><p>\n&#8230;when it comes to dealing with ISPs, obfuscation is some combination of hostile, unprofessional, and harmful. Software projects which value quality over featuritis generally steer clear of such things, especially when their potential effectiveness level is the equivalent of spitting in one&#8217;s face than actual utility.<\/p>\n<p>Oh, and by the way, the amount of CPU necessary to do a diffie-hellman key exchange is enough to be annoying, and if you&#8217;re making a connection via a trusted intermediary, like, say, a tracker, or already have a reasonably secret piece of shared information like, say, an infohash, there&#8217;s no need to use a diffie-hellman key exchange to establish a shared secret. Imagining that crypto will stop being done by dilettantes is clearly a pipe dream though.<\/p><\/blockquote>\n<p>This won&#8217;t stop the pirates, of course, but it should cause them to think about what they&#8217;re doing. Not that it will.<\/p>\n<p>Note: A reader points out that Cohen&#8217;s remarks referred to a previous obfuscation scheme that clearly didn&#8217;t work, and suggests the current one will work for some magic reason. I doubt it, because all that Comcast has to do is look for a large number of inbound connections when none are going out. No form of obfuscation will hide that scenario because the traffic stats alone are enough to expose it. I never cease to be amazed by how naive these pirates can be.\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The infamous &#8220;Ernesto&#8221; announces new countermeasures to grab even more of Comcast&#8217;s residential network: BitTorrent throttling is not a new phenomenon, ISPs have been doing it for years. When the first ISPs started to throttle BitTorrent traffic most BitTorrent clients introduced a countermeasure, namely, protocol header encryption. This was the beginning of an ongoing cat &hellip; <a href=\"https:\/\/bennett.com\/blog\/2008\/02\/15\/bittorrentcomcast-cat-and-mouse-game-continues\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;BitTorrent\/Comcast Cat-and-Mouse Game Continues&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[38],"tags":[],"class_list":["post-4369","post","type-post","status-publish","format-standard","hentry","category-net-neutrality"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbifyw-18t","_links":{"self":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts\/4369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/comments?post=4369"}],"version-history":[{"count":0,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts\/4369\/revisions"}],"wp:attachment":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/media?parent=4369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/categories?post=4369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/tags?post=4369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}