<div><span class="gmail_quote">On 1/28/09, <b class="gmail_sendername">Ralf Bendrath</b> <<a href="mailto:bendrath@zedat.fu-berlin.de">bendrath@zedat.fu-berlin.de</a>> wrote:</span>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Ginger Paque schrieb:<br>> This transparency is a positive step peripheral to the NN debate:<br><br>It goes right to the heart, actually. While this transparency is nice, and<br>
their approach to bandwidth management sounds very well-intended, this<br>announcement also means that Cox will look into the traffic of each<br>customer to determine which application is using the TCP stack ("deep<br>
packet inspection" is the technical term). </blockquote>
<div> </div>
<div>Well, to be fair, one can understand which application a particular </div>
<div>packet "belongs to" simply by checking the TCP header (in particular,</div>
<div>the destination ports which are usually fixed).</div>
<div> </div>
<div>I would have some problems defining "ipso facto" this a "deep packet </div>
<div>inspection" , as this would imply that many useful applications on </div>
<div>the Internet (including, for example, transparent proxying, whether </div>
<div>for the purpose of caching or not) become all at once "problematic".</div>
<div> </div>
<div>Best,</div>
<div> </div>
<div>Andrea</div><br> </div>