tag:blogger.com,1999:blog-84695090657126133952024-03-14T01:52:51.640-07:00HughesNet SucksWhy even bother with this satellite internet service? It's been a long and arduous journey with an ISP that doesn't care a whit about their customers.
This is my story of a service that at best can described as average. In fact, it's best described as dialup-over-the-satellite. Certainly not high-speed internet service.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.comBlogger62125tag:blogger.com,1999:blog-8469509065712613395.post-13454669168239132642008-02-02T08:09:00.000-08:002008-02-03T11:31:04.759-08:00F R E E D O MLast week, I finally told HughesNet that I didn't need them anymore. <br /><br />NO. MORE. SATELLITE. INTERNET.<br /><br />I was only a month behind my goal of getting rid of HughesNet, but it came along with a move to a new city and state. And the most pleasant surprise is a really high speed internet connection for $36, along with a package of cable tv (I may go with DirecTV later since their programming is better and they have some channels I really like). I told the person when I signed up for high speed internet that I liked the internet music stations like SomaFm and Radio Paradise, and she said there was no problem. We'll see.<br /><br />NO MORE $60/MTH FOR DIALUP OVER THE SATELLITE.<br /><br />Beyond this, I really don't have anything to add to the blog. The links on the right side provide great places to get news on the (poor) state of the US internet. I'll leave it here (with sporadic updates) for people wondering about HughesNet and other satellite internet providers.<br /><br />To those people, I would recommend, DON'T DO IT.<br /><br /><br />HughesNet, it's been a long and difficult relationship over the last year since you implemented FAP caps last year and started started penalizing people for using what they paid for. I won't miss the pain-in-the-ass headaches you caused me. In fact, I'll be glad to read in the future when you fail for the reasons mentioned in this blog and then file for bankruptcy. You won't be missed. Just another example of corporate greed killing another business.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com24tag:blogger.com,1999:blog-8469509065712613395.post-36480941290148936522007-12-30T10:20:00.000-08:002007-12-30T10:22:19.975-08:00Oregon gets props for this<a href="http://www.pcworld.com/article/id,140173-c,copyright/article.html">Oregon Challenges RIAA's Tactics in Music Piracy Claim</a><br />The state attorney general is resisting the music labels' demand for consumer identities.<br />by Jaikumar Vijayan, Computerworld, Saturday, December 01, 2007<br /><br />(links in the original article on the Computerworld site)<br /><br />Oregon is fast becoming Ground Zero in the contentious battle between the Recording Industry Association of America (RIAA) and the tens of thousands of consumers it accuses of illegal music sharing.<br /><br />The state Attorney General's office this week filed an appeal in U.S. District Court in Oregon calling for an immediate investigation of the evidence presented by the RIAA when it subpoenaed the identities of 17 students at the University of Oregon who allegedly infringed music copyrights. It is the second time in a month that Oregon Attorney General Hardy Myers has resisted attempts by the RIAA to force the university to turn over the names of individuals it says shared music illegally.<br /><br />Officials at the RIAA could not immediately be reached for comment.<br /><br />"It is a really huge step when the head law enforcement officer of a state wants to investigate the RIAA's evidence-gathering techniques," said Ray Beckerman, a New York-based lawyer who has been defending individuals in RIAA lawsuits.<br /><br />Myers' move raises fundamental -- and overdue -- questions about the tactics used by the RIAA in its campaign against alleged music pirates, Beckerman said. "The RIAA has been bringing fake copyright infringement lawsuits, the sole purpose of which is to get the names and addresses of John Does," he said. They then drop the case and try to pressure these individuals into settling based on dubious evidence at best, he said.<br /><br />In a 15-page brief filed Wednesday, Oregon's assistant attorney general, Katherine Von Ter Stegge, said that while it is appropriate for victims of copyright infringement to pursue statutory remedies, that pursuit had to "tempered by basic notions of privacy and due process.<br /><br />"The record in this case suggests that the larger issue may not be whether students are sharing copyrighted music," the state's brief noted. Rather it is about whether the litigation strategies adopted by the RIAA are appropriate or capable of supporting their claims.<br /><br />For example, the individual in whose name the subpoena was issued had no first-hand information about the alleged misconduct of the students or the subsequent investigations by the RIAA, the appeal filed by Myers' office noted.<br /><br />The data mining techniques that the RIAA used also only show that certain copyrighted music files existed along with software that could be used to share these files. But it does not show how the music files were originally obtained or whether the files were actually illegally shared thereafter. As a result, all that was shown was a potential for misuse not actual misuse, the AG noted in court papers.<br /><br />The brief also questioned whether the RIAA's investigators themselves might have illegally accessed and uploaded private confidential information not related to copyright infringement, that might have been stored on the computers of people being investigated. "Without reciprocal discovery, there is no process to assess precisely how invasive the plaintiffs' investigation was with regard to the John Does named in this suit," the brief said.<br /><br />The state also questioned whether previous cases suggest that the RIAA may have abused the judicial process by obtaining the identities of suspected copyright infringers and then choosing not to purse litigation. Rather, it used collection firms to leverage payment of "arbitrary sums of money, based on threats and evidence from the data mining." There is no way for the university to find out whether this is true unless the RIAA can be asked about it specifically, the state argued.<br /><br />Myers' latest salvo comes just a few weeks after an earlier motion was filed asking the court to quash the RIAA subpoena. In that motion, filed Oct. 31 on behalf of the University of Oregon, Myers said that the university was unable to identify 16 of the 17 alleged music pirates based on IP address information provided by the RIAA.<br /><br />The RIAA has subpoenaed universities and Internet service providers for the identities of individuals it suspects of illegal file sharing. The modus operandi is to send the university -- or service provider -- a list of IP addresses on their networks that the RIAA is targeting. It then demands the identities of the individuals to whom the IP addresses were assigned.<br /><br />In the Oregon university case, five of the 17 John Does in the RIAA subpoena accessed the copyrighted content in question from double occupancy dorms. That made it hard for the university to know who specifically might have accessed and shared copyrighted information, Myers claimed. The university also could not say whether the alleged copyright infringement had been done by the individuals that the IP addresses had been assigned to, or by others.<br /><br />This week's brief was filed in response to an RIAA appeal opposing the state's earlier effort to quash the RIAA subpoena.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-16892390611152243102007-12-30T10:11:00.000-08:002007-12-30T10:19:47.324-08:00The Top 10 Reasons to avoid Satellite Internet - Number 9<b>No Music streaming, downloading movies, VOIP, or other apps</b><br /><br />It's hard to be a 21st-century internet user when the ISP-mindset is 19th-century. As with dialup, these applications won't work on satellite for one reason (FAP) or another (traffic shaping). By the time the ISP comes up with its business model to overcharge its customers through the nose, it's cheaper to do it the old way.<br /><br />So much for progress and technology.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-76190006674568182372007-12-30T09:57:00.000-08:002007-12-30T10:11:11.850-08:00The Top 10 Reasons to avoid Satellite Internet - Number 10<b>Weather</b><br /><br />Wanna know what I was doing the week before Christmas after the six inches of snow and ice? <br /><br />In 20-degree weather, I was putting the ladder up to go upon the roof of the house to clean the dish off. Always happens that way. Snow will settle on the dish and then there's no internet access.<br /><br />Even when it's a sunny day with clear skies, the satellite can drop out of the blue. <br /><br />And of course, there's always storms and rain and whatever weather-related where the internet connection will inexplicably drop. <br /><br />Then of course when that happens, you can either wait or call India using the 800-support line.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-68063890099148469082007-12-30T09:40:00.000-08:002007-12-30T09:55:54.112-08:00The Myth Of The Bandwidth Crunch Just Won't DieTechdirt comes through again!<br /><br /><a href="http://www.techdirt.com/articles/20071227/124634.shtml">The Myth Of The Bandwidth Crunch Just Won't Die</a><br /><br />rom the this-again? dept<br />A few months back we noticed a trend. Whenever we heard fear mongering reports about the internet running out of capacity, they almost always came from folks who weren't technologists. Instead, they tended to be telco business folks, lobbyists or politicians. When it came to actual technology people who had real experience and real data concerning what was happening on the network, we would see <a href="http://www.techdirt.com/articles/20070917/010343.shtml">over</a> and <a href="http://www.techdirt.com/articles/20070405/190255.shtml">over</a> and <a href="http://www.techdirt.com/articles/20060328/1859213.shtml">over</a> and <a href="http://www.techdirt.com/articles/20070413/011103.shtml">over</a> again that the "threat" of a bandwidth crunch is pretty much a myth. We're not running out of bandwidth, and the ongoing upgrades to the network should be able to handle whatever growth comes along. There's no reason to panic... yet, that's not the message that the telcos want you to hear. After all, it's in their interest to work up fears of internet capacity problems so that politicians will pass legislation providing them with <a href="http://www.techdirt.com/articles/20071119/115734.shtml">subsidies</a> or other unnecessary benefits. <br /><br />So, when Broadband Reports <a href="http://www.dslreports.com/shownews/In-Favor-Of-PerByte-Broadband-Billing-90516">pointed</a> us to an op-ed piece in the Boston Globe by a Harvard professor talking about the coming bandwidth crunch and the need to <a href="http://www.boston.com/bostonglobe/editorial_opinion/oped/articles/2007/12/26/increasing_internet_capacity/">switch to metered pricing</a> (another telco favorite, after they were too clueless to accurately predict that unmetered pricing would lead to more usage), it wasn't difficult to guess that she didn't have a technology background. Instead, it appears her background is entirely in <a href="http://ksgfaculty.harvard.edu/Elaine_Kamarck">public policy</a>. There's certainly nothing wrong with folks looking at this issue from a public policy position (in fact, it's important). But, before they claim that the internet is running into trouble, shouldn't they look at what those who actually have the data have to say about the matter?<br /><br /><br />* * * * *<br /><br /><i><b>John Doe Comment:</b> Nothing new here, and pretty much what we've said all along. The telco and ISP industry can't create new revenue streams with new forms of business offerings, so they go with the "FAP" (fair access policy) nonsense. So when you can't create, then implement bad and dishonest business models with invented scare strategies like "the internet's running out of bandwidth". </i>John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-10915406960231410682007-12-03T15:22:00.000-08:002007-12-03T15:29:08.285-08:00They did it againA couple of weeks ago, HughesNet degraded their service yet <b>again</b>. Um, their already dialup-over-the-satellite slow connection has gotten even s-l-o-w-e-r.<br /><br />How do I know this? Gmail used to take me straight into my inbox. Now, it tells me my internet connection is slow and tells me to use the basic HTML version.<br /><br />HughesNet continues to make their bad business model worse. <br /><br />Soon it won't be my concern.<br /><br />Coming soon ----> <b>The Top 10 Reasons to avoid Satellite Internet Snakeoil</b>.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com17tag:blogger.com,1999:blog-8469509065712613395.post-17866761268183090792007-11-13T12:23:00.000-08:002007-11-13T12:25:50.884-08:00Um, how's that "capitalism" stuff go again?From the Techdirt files . . . . . <br /> <br /><a href="http://www.techdirt.com/articles/20071104/205423.shtml">Service Providers Can't Be Honest With Themselves, So How Can They Be Honest With You?</a><br />from the self-realization-time dept<br /><br />Last week I was wondering why the various mobile operators couldn't just be honest to customers in explaining the limitations of various service plans. A report had come out saying that people were sick and tired of service providers lying about service and features -- and it seemed to me that a company that was honest would get a lot of customers as a result of that honesty. Of course, this also came only a few days after we were wondering why Comcast couldn't come out and give an honest explanation for why it was jamming certain types of packets. Blogger Tom Lee from the Manifest Density blog, has responded to both things (though, incorrectly refers to Techdirt as being anti-telco, which we're not at all -- we're anti-telco-stupidity, which is quite different), making a very perceptive point. He basically says that it's impossible for any of these service providers to be honest with customers because doing so would require them to first admit the truth to themselves: they're just commodity dumb pipe providers, and all their efforts at pretending to be something more are pretty much meaningless. Until they can admit that (and Lee's assertion is they won't admit that), they can't be honest with customers. There's definitely a large chunk of truth in there, and it explains part of what the problem is -- but I still don't think that precludes service providers from being a lot more honest, even as they try to provide additional value-added services that might not matter. Being honest and transparent with customers is a good marketing idea for these companies, especially as they're being challenged to be anything more than a commodity dumb pipe provider. Being honest can actually be a part of their differentiated appeal to customers.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-80198481866246508612007-11-13T12:16:00.000-08:002007-11-13T12:21:49.863-08:00Hushmail is gonna be historyFrom the Techdirt files......<br /><br /><a href="http://www.techdirt.com/articles/20071108/093110.shtml">Hushmail Turns Out To Not Be Quite So Hush Hush</a><br />from the privacy-is-an-illusion dept<br /><br />Many people are familiar with the company Hushmail, who provides encrypted web-based email that the company claims is completely private. In fact, the company makes it clear: "not even a Hushmail employee with access to our servers can read your encrypted e-mail, since each message is uniquely encoded before it leaves your computer." It turns out that isn't quite true. <a href="http://blog.wired.com/27bstroke6/2007/11/encrypted-e-mai.html">Wired reports that Hushmail handed the feds 12 CDs worth of plain text emails from the service following a court order</a>. The Wired piece goes into great detail concerning what happened here -- and the folks at Hushmail were quite honest about how their service works. Hushmail has two different versions, one which requires a java app to be downloaded, which handles all the encryption locally. The other, more popular one, is entirely web-based, meaning that your passphrase is stored on the server ever so briefly -- and that's how Hushmail was able to access the accounts required in the court order. So, while it's true that Hushmail is mostly secure outside of a court order, the marketing material on the site is at least a little misleading, implying that even in such cases, your email will be encrypted.<br /><br /><br />From Wired . . . .<br /><a href="http://blog.wired.com/27bstroke6/2007/11/encrypted-e-mai.html">Encrypted E-Mail Company Hushmail Spills to Feds</a><br />By Ryan Singel November 07, 2007 | 6:39:41 PMCategories: Crime, Hacks and Cracks <br /><br />Hushmail, a longtime provider of encrypted web-based email, markets itself by saying that "not even a Hushmail employee with access to our servers can read your encrypted e-mail, since each message is uniquely encoded before it leaves your computer."<br /><br />But it turns out that statement seems not to apply to individuals targeted by government agencies that are able to convince a Canadian court to serve a court order on the company.<br /><br />A September court document (.pdf) from a federal prosecution of alleged steroid dealers reveals the Canadian company turned over 12 CDs worth of e-mails from three Hushmail accounts, following a court order obtained through a mutual assistance treaty between the U.S. and Canada. The charging document alleges that many Chinese wholesale steroid chemical providers, underground laboratories and steroid retailers do business over Hushmail.<br /><br />The court revelation demonstrates a privacy risk in a relatively-new, simple webmail offering by Hushmail, which the company acknowledges is less secure than its signature product.<br /><br />A subsequent and refreshingly frank e-mail interview with Hushmail's CTO seems to indicate that government agencies can also order their way into individual accounts on Hushmail's ultra-secure web-based e-mail service, which relies on a browser-based Java encryption engine.<br /><br />Since its debut in 1999, Hushmail has dominated a unique market niche for highly-secure webmail with its innovative, client-side encryption engine.<br /><br />Hushmail uses industry-standard cryptographic and encryption protocols (OpenPGP and AES 256) to scramble the contents of messages stored on their servers. They also host the public key needed for other people using encrypted email services to send secure messages to a Hushmail account.<br /><br />The first time a Hushmail user logs on, his browser downloads a Java applet that takes care of the decryption and encryption of messages on his computer, after the user types in the right passphrase. So messages reach Hushmail's server already encrypted. The Java code also decrypts the message on the recipient's computer, so an unencrypted copy never crosses the internet or hits Hushmails servers.<br /><br />In this scenario, if a law enforcement agency demands all the e-mails sent to or from an account, Hushmail can only turn over the scrambled messages since it has no way of reversing the encryption.<br /><br />However, installing Java and loading and running the Java applet can be annoying. So in 2006, Hushmail began offering a service more akin to traditional web mail. Users connect to the service via a SSL (https://) connection and Hushmail runs the Encryption Engine on their side. Users then tell the server-side engine what the right passphrase is and all the messages in the account can then be read as they would in any other web-based email account.<br /><br />The rub of that option is that Hushmail has -- even if only for a brief moment -- a copy of your passphrase. As they disclose in the technical comparison of the two options, this means that an attacker with access to Hushmail's servers can get at the passphrase and thus all of the messages.<br />In the case of the alleged steroid dealer, the feds seemed to compel Hushmail to exploit this hole, store the suspects' secret passphrase or decryption key, decrypt their messages and hand them over.<br /><br />Hushmail CTO Brian Smith declined to talk about any specific law enforcement requests, but described the general vulnerability to THREAT LEVEL in an e-mail interview (You can read the entire e-mail thread here):<br />The key point, though, is that in the non-Java configuration, private key and passphrase operations are performed on the server- side.<br />This requires that users place a higher level of trust in our servers as a trade off for the better usability they get from not having to install Java and load an applet.<br />This might clarify things a bit when you are considering what actions we might be required to take under a court order. Again, I stress that our requirement in complying with a court order is that we not take actions that would affect users other than those specifically named in the order.<br />Hushmail's marketing copy largely glosses over this vulnerability, reassuring users that the non-Java option is secure.<br /><br />Turning on Java provides an additional layer of security, but is not necessary for secure communication using this system[...]<br />Java allows you to keep more of the sensitive operations on your local machine, adding an extra level of protection. However, as all communication with the webserver is encrypted, and sensitive data is always encrypted when stored on disk, the non-Java option also provides a very high level of security.<br /><br />But can the feds force Hushmail to modify the Java applet sent to a particular user, which could then capture and sends the user's passphrase to Hushmail, then to the government?<br />Hushmail's own threat matrix includes this possibility, saying that if an attacker got into Hushmail's servers, they could compromise an account -- but that "evidence of the attack" (presumably the rogue Java applet) could be found on the user's computer.<br />Hushmail's Smith:<br />[T]he difference being that in Java mode, what the attacker does is potentially detectable by the user (via view source in the browser).<br /><br />"View source" would not be enough to detect a bugged Java applet, but a user could to examine the applet's runtime code and the source code for the Java applet is publicly available for review. But that doesn't mean a user could easily verify that the applet served up by Hushmail was compiled from the public source code.<br /><br />Smith concurs and hints that Hushmail's Java architecture doesn't technically prohibit the company from being able to turn over unscrambled emails to cops with court orders.<br /><br />You are right about the fact that view source is not going to reveal anything about the compiled Java code. However, it does reveal the HTML in which the applet is embedded, and whether the applet is actually being used at all. Anyway, I meant that just as an example. The general point is that it is potentially detectable by the end-user, even though it is not practical to perform this operation every time. This means that in Java mode the level of trust the user must place in us is somewhat reduced, although not eliminated.<br /><br />The extra security given by the Java applet is not particularly relevant, in the practical sense, if an individual account is targeted. (emphasis added) [...]<br />Hushmail won't protect law violators being chased by patient law enforcement officials, according to Smith.<br /><br />[Hushmail] is useful for avoiding general Carnivore-type government surveillance, and protecting your data from hackers, but definitely not suitable for protecting your data if you are engaging in illegal activity that could result in a Canadian court order.<br /><br />That's also backed up by the fact that all Hushmail users agree to our terms of service, which state that Hushmail is not to be used for illegal activity. However, when using Hushmail, users can be assured that no access to data, including server logs, etc., will be granted without a specific court order.<br /><br />Smith also says that it only accepts court orders issued by the British Columbia Supreme Court and that non-Canadian cops have to make a formal request to the Canadian government whose Justice Department then applies, with sworn affidavits, for a court order.<br /><br />We receive many requests for information from law enforcement authorities, including subpoenas, but on being made aware of the requirements, a large percentage of them do not proceed.<br />To date, we have not challenged a court order in court, as we have made it clear that the court orders that we would accept must follow our guidelines of requiring only actions that can be limited to the specific user accounts named in the court order. That is to say, any sort of requirement for broad data collection would not be acceptable.<br /><br />I was first tipped to this story via the Cryptography Mailing List, and Kevin, who had been talking with Hushmail about similar matters involving another case, followed up with Smith. We both agree Hushmail deserves credit for its frank and open replies (.pdf). Such candor is hard to come by these days, especially since most ISPs won't even tell you how long they hold onto your IP address or if they sell your web-surfing habits to the highest bidders.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-57352399943446818812007-11-13T12:03:00.000-08:002007-11-13T12:07:21.646-08:00This week in fuckwit history . . . .HughesNet degraded their service yet again. Now your internets are even <b>s-l-o-w-e-r</b>. Now the average is about 1-1/2 minutes to load a page when you click your mouse.<br /><br />Fuckwit Nation marches on.<br /><br />I wonder about HughesNet CEO. Is "clueless" a job prerequisite.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com1tag:blogger.com,1999:blog-8469509065712613395.post-22210887723129324562007-10-31T09:20:00.000-07:002007-10-31T09:46:15.832-07:00HughesNet & Sandvine (traffic shaping)Sandvine lists DirecTV as a customer on the website. One can reasonably conclude that HughesNet also uses Sandvine to enforce its FAP ("Fair Access Policy" aka imposing traffic caps on the user). <br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirXHadRY-RboLdzkkCX873LtPDZfvDK64lQmd-9PT_21TVUTfVG6LE0opiN-dNkQyNnunRwQf-ux6jhtvRZ1BFvfJhmsI8d8LoZA75_kXwMv_6sM_kZu6MqQiXBKfLULcfYepqURjP9cvs/s1600-h/Picture+1.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirXHadRY-RboLdzkkCX873LtPDZfvDK64lQmd-9PT_21TVUTfVG6LE0opiN-dNkQyNnunRwQf-ux6jhtvRZ1BFvfJhmsI8d8LoZA75_kXwMv_6sM_kZu6MqQiXBKfLULcfYepqURjP9cvs/s320/Picture+1.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5127543029369131106" /></a><br /><br /><br /> Wiki has a writeup on <a href="http://en.wikipedia.org/wiki/Sandvine"> Sandvine</a>. <br /><br /><i>"....<b>Controversy</b><br /><br />Sandvine is reportedly used by Comcast to reduce the impact of BitTorrent and other P2P traffic, but does so by sending forged RST packets rather than traffic shaping. This interferes with other network protocols, and potentially violates network neutrality as well as fraud laws on the part of the ISP. Recently, Comcast customers have also reported an inability to use Google because forged RST packets are also interfering with HTTP access to google.com [2], which has further angered users.[3]..."</i>John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-17629538058432950432007-10-31T09:13:00.000-07:002007-10-31T09:20:23.608-07:00HughesNet & Deceptive MarketingThere oughta be a law. Oh wait, there is. It's called <b>Truth-In-Advertising</b>.<br /><br />From the <a href="http://en.wikipedia.org/wiki/HughesNet">Wiki</a> (links on the website) . . . . <br /><br />....<br /><br /><b>Commercials</b><br /><br />Throughout its history, HughesNet has run a series of television commercials featuring actress Margaret Easley. Each time the name of the service has changed, a new commercial has been filmed. The central message of each commercial is fairly consistent, stating to viewers that anyone in the continental United States can have Internet access and "all you need is a clear view of the southern sky." Most of the commercials are 60 seconds in length, but there have also been 30-second variants as well as 30-minute infomercial-length variants which are broadcast both on normal DirecTV channels as well as on DirecTV channel 227, a channel that DirecTV uses solely for its own infomercials.<br /><br /><b>One of the commercials <u>had a demonstration of the service with web pages moving very fast, but if one looked at the program bar of IE, it says it is working offline. This means that they weren't connecting to the Internet when loading the pages, but browsing from their cache</u>. As of May 2006, an older DirecWay commercial is hosted and viewable on Margaret Easley's website.</b>John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-90957393869508816272007-10-30T08:32:00.000-07:002007-10-30T08:33:36.128-07:00US Corporations are LaughableFrom Techdirt . . . .<br /><br /><a href="http://www.techdirt.com/articles/20071029/020756.shtml">Comcast Will Fire Employees For Admitting That Comcast Uses Sandvine?</a><br />from the what-are-you-hiding? dept<br /><br />We still can't figure out why Comcast doesn't just come right out and admit what it's doing in jamming certain kinds of traffic. It's not like it's a secret any more -- and the longer Comcast tries to play dumb on this, the worse it looks for the company. The oddest part, though, is that Comcast won't even admit that it's using Sandvine's traffic shaping equipment -- even though Sandvine clearly lists Comcast as a customer and has used them as a reference customer in news articles. Even worse, though is that Comcast has apparently now issued a bunch of ridiculous talking points to customer service reps about this issue. Apparently, the customer service folks are being told that if they deviate from the script, they risk getting terminated. The script even includes how to respond to a point blank question about Sandvine, refusing to admit what appears to be public knowledge at this point. It's not at all clear what Comcast thinks it gains in acting this way. It seems to have only made an awful lot of customers quite angry at the company. Lucky for Comcast, though, that the US broadband market is such a disaster many customers have nowhere else to go.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-25114739732409379192007-10-30T08:04:00.000-07:002007-10-30T08:30:08.019-07:00Traffic Shaping and HughesNetLast week, if you have HughesNet as your dialup-over-the-satellite ISP, you noticed your speeds took a hit. This week, you'll notice if you have any pages with multiple picture files (ie. jpg, png), your page load times will literally take <b>minutes</b> (PLURAL and MORE than a few minutes).<br /><br />All part of HughesNet "traffic shaping" strategy to try to get you to upgrade from the overpriced $60/mth service to something more expensive. <br /><br />Where Japan and other countries are providing more bandwidth for less cost, the US has allowed corporations to do the exact opposite.<br /><br />This is why the US competive edge was lost. This is why investors are looking at other places to do business instead of the US.<br /><br />Something tells me all the MBAs running companies these days think it's a license to run the business in the ground and run their customers off. <br /><br />Something tells me that strategy is working.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-30668004229565555192007-10-26T17:44:00.000-07:002007-10-26T17:49:38.325-07:00From the billionaire columnist who earned his money the old fashioned way....he married it.And who's pretty much of a no-talent otherwise. The closest he's been to work is when his chauffer drives him to the office. Wonder what the real estate heiress saw in him anyway?<br /><br />From Techdirt . . . .<br /><br /><br /><a href="http://www.techdirt.com/articles/20071012/155623.shtml">Old Fogeyism Isn't That Surprising</a><br />from the kids-these-days dept<br /><br /><br />Last week Thomas Friedman penned a silly column claiming that Internet-based activism doesn't "count" as real political engagement. "Activism can only be uploaded, the old-fashioned way — by young voters speaking truth to power, face to face, in big numbers, on campuses or the Washington Mall. Virtual politics is just that — virtual," he says. As various people have pointed out, this is complete nonsense. I engaged in some campus activism in college in the late 1990s, and I have trouble even imagining how students coordinated their activities in the pre-email days. Blogs have proven an incredibly potent force for rooting out and publicizing injustice. And I'm sure the technologies that have evolved since I graduated are just as valuable to campus activists. Obviously, online activism by itself doesn't accomplish anything, but by the same token neither do telephone calls or newspaper columns. Rather, these are all tools that activists can use to coordinate their activities more efficiently. Many of the people who sign up for candidates' Facebook groups do go to the candidates' rallies or volunteer for their campaigns.<br /><br />However, I think we shouldn't be too hard on Friedman. After all, it's pretty common for older people to complain about young people and their new-fangled ways of doing things. There are journalism professors who believe that you have to publish on paper to "count" as a serious journalist. There were lots of people who looked down their noses at Internet dating when it began, and some people still sneer at efforts to improve the online matchmaking process. And of course, there are books arguing that volunteer-driven content like Wikipedia is destroying our culture by undermining traditional ways of organizing information. Most of these arguments are silly, obviously, but it's not that hard to understand where they're coming from. If you've spent decades thinking about an activity in a particular way (if, say, you've been a print journalist for 30 years) you're going to have deeply-ingrained assumptions about how that activity is supposed to be done. And so when people start doing it a different way, it's inevitably going to seem incomprehensible and weird. So while I think Friedman's wrong, I don't think Friedman's being particularly obtuse. He's just fallen prey to garden-variety old fogeyism.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-19725922598602402942007-10-26T17:43:00.000-07:002007-10-26T17:44:41.934-07:00Liar liar pants on fireFrom techdirt . . . .<br /><br /><a href="http://www.techdirt.com/articles/20071019/115242.shtml">Associated Press Confirms That Comcast Blocks Some BitTorrent Traffic; Despite Comcast Denials</a><br />from the someone's-not-being-totally-honest-here... dept<br /><br />Back in August, there was a report that Comcast was throttling certain types of BitTorrent traffic making it difficult to impossible to seed a download. In response, Comcast vehemently denied this was happening, despite many people saying they were experiencing it. Specifically, Comcast said: "the company doesn't actively look at the applications or content that its customers download over the network. But Comcast does reserve the right to cut off service to customers who abuse the network by using too much bandwidth." The EFF went and spoke with Comcast and got the same story. However, with so many people reporting the same thing, some were wondering how truthful Comcast was. Now the Associated Press has done their own investigation (trying to transfer the Bible since it's in the public domain) and found that Comcast is clearly blocking the ability to upload completed files via BitTorrent, inserting a message to a computer trying to upload a file pretending to be from the downloading computer, telling it to stop sending. This seems to go against what Comcast originally said, though when the AP asked for a comment, Comcast subtly changed it's story. Rather than saying it doesn't look at applications or content, now it says: "Comcast does not block access to any applications, including BitTorrent." No, it doesn't block "access" but it does limit the functionality greatly (including perfectly legitimate uses of BitTorrent) without letting people know about it.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-15864070343231301462007-10-26T17:42:00.000-07:002007-10-26T17:43:21.491-07:00Well......From Techdirt . . . . <br /><br /><a href="http://www.techdirt.com/articles/20071021/150541.shtml">What Else Is Comcast Jamming? Gnutella? Lotus Notes?</a><br />from the might-help-to-be-a-little-transparent dept<br /><br />After the AP confirmed that Comcast was clearly blocking some aspects of Bittorrent, Comcast continued to issue its oddly worded denial statement about how it doesn't specifically block access to any application or content. Of course, that can mean different things to different people, and as the EFF is discovering, perhaps Comcast is being half-truthful in saying it doesn't specifically pick on BitTorrent trafffic. However, that's only because it's doing similar kinds of blocking on other types of traffic, such as content using Gnutella or even Lotus Notes. The EFF has been running a variety of tests and has found that Comcast appears to send forged reset packets for Gnutella, and it points to someone else who found the same thing for Lotus Notes. <br /><br />Of course, Comcast can do what it wants on its network, but to deny it and not be even remotely transparent about it is pretty questionable (and potentially a violation of FTC rules). Once again, this is the type of thing that wouldn't happen if there were true competition in the broadband market. If people knew that Comcast was arbitrarily cutting off what they could do on their network with no indication (and, actually, actively hiding the fact that they were doing so) many people would look for alternatives. The only problem is that there often aren't any alternatives. Even in the cases where there are, the alternatives often include one other player: a telco like AT&T who seems to be gearing up to do the same thing as Comcast in blocking certain types of content online. It really is a simple question, though: why won't Comcast tell its own customers what it's blocking? When you find out that the company is blocking completely legitimate applications and services with no recourse (or even information admitting it), it's really quite troublesome.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-32921911630392308352007-10-26T17:39:00.000-07:002007-10-26T17:41:53.665-07:00Smart. Obviously not in the U.S.From Techdirt . . . . <br /><br /><a href="http://www.techdirt.com/articles/20071021/002050.shtml">How Embracing Piracy Jumpstarted Brazilian Music</a><br />from the oh-look-at-that... dept<br /><br />One of the more amusingly wrong statements from the RIAA and its supporters is the idea that piracy is killing the music industry. Those who say that without being able to sell music there would be less music out there are flat out wrong, and we seem to see more proof of it every day. There's more music being produced today than ever before and it's often because of file sharing -- the very thing the industry honchos want you to believe is killing the industry. For natural experiments, we've pointed in the past to places like China and Jamaica. In China, where "piracy" is rampant, the music industry is thriving. Musicians have learned to use the piracy to help promote themselves so they can sell more concert tickets at higher prices. They also realized that companies would often pay for the creation of new music, so that it could be used to boost brand recognition of products. Meanwhile, in Jamaica, musicians competed to make better versions of songs, using the same "riddims," but adding their own singing over them. While in an RIAA-inspired world, the "riddim" creators would get upset, in Jamaica it's been great for them. The most popular riddims turn their creators into stars who are in high demand to create new riddims from musicians who are eager to be the first to create their own songs on top of the new riddims from the hottest riddim creators. <br /><br />Now it looks like we can add Brazil to the list of natural examples. There, the tecnobrega music scene is on fire thanks to musicians embracing piracy. They don't just look the other way, they actively encourage it. Musicians burn their own CDs and rush them down to street vendors, begging them to sell them (without the musicians getting any cut at all). Those musicians also upload MP3s and email them to popular DJs who make mixtapes (similar to the US hiphop mixtape scene). Just like in China, the artists realize that they need to use so-called "piracy" to help them get more publicity. "Piracy is the way to get established and get your name out. There's no way to stop it, so we're using it to our advantage," according to one tecnobrega star, Gabi Amarantos. Contrary to what the RIAA and it supporters would tell you, the lack of copyright respect hasn't hurt the tecnobrega space at all -- it's made it explode. It's allowed many more musicians to make a decent living from music than via a traditional model and it means that much more technobrega music is being produced. In other words, all the stories about how a lack of copyright creates less music are, once again, provably wrong. Yet, of course, the RIAA and its supporters will continue to repeat the lie. In fact, the National Anti-Piracy Association in Brazil says that tecnobrega is a problem because it "makes light of piracy." It's not "making light" of piracy -- it's making money from piracy.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-11776148632486960962007-10-26T17:37:00.000-07:002007-10-26T17:39:54.579-07:00Um. . . .not usI don't understand it. Crooks used to be smarter.<br /><br /><br />From Techdirt . . . . <br /><br /><a href="http://www.techdirt.com/articles/20071022/180036.shtml">Comcast Still Dancing Around Its Content Jamming Operations; What's Wrong With Admitting It?</a><br /><br />from the shhhh,-it's-a-secret-that-everyone-knows dept<br />With the news coming out that Comcast's broadband jamming operations actually interfere with other apps as well, Comcast is now trying to respond to the complaints in every way other than telling people what it is that they're doing, which at this point really does appear to be the only sensible response. Comcast went to Reuters (since it was AP who confirmed the original story) and repeated the carefully worded claim that Comcast is not blocking any kind of traffic. Of course, people aren't saying that it's completely blocking any traffic -- just that it's quietly pulling some background tricks to slow down certain types of traffic without letting its customers know. That's the key part, and it's the same complaint that people have had for years with Comcast concerning its fuzzy bandwidth caps. The company advertises unlimited service, but if it's not unlimited, why not come out and explain what the limitations are? It seems only fair. <br /><br />Perhaps an answer comes from Tim Lee, who was invited to a conference call today with Comcast to help "clear up" the misperceptions Comcast feels are being spread in the media about its actions. The only problem is that Comcast doesn't clear up anything. It basically admits to the traffic shaping but says it can't tell people that it's doing that, as it could help them get around the shaping. Well, sorry, too late for that. Besides, what's wrong with simply telling people what the limitations are and then going after the violators for terms of service breaches? In being so secretive and misleading about it, all it's doing is causing many more people to get upset with Comcast and think that they're being targeted (even if they're not). It's a ridiculous PR situation for Comcast to be in -- and it could be solved easily enough if Comcast stopped beating around the bush, stopped giving gobbledy-gook doublespeak responses that don't actually answer the questions people are asking and simply told people what they're doing and why. It really is that simple. If the company has a legitimate reason for doing what it's doing (and some people say there is) then why not explain that?John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-38517029558793182662007-10-26T17:32:00.000-07:002007-10-26T17:35:25.915-07:00Think tank: More broadband regulation may be neededFrom Benton . . . .<br /><br /><a href="http://www.benton.org/node/7712">Think tank: More broadband regulation may be needed</a><br />Information Technology and Innovation Foundation president says higher speeds and lower prices for broadband won't develop without government help <br /><br />By Grant Gross, IDG News Service<br /><br />Competition may not fix problems with broadband speed and cost in the United States, because of the high cost of entry into the market, the leader of a technology think tank said Friday.<br /><br /> Many policymakers in Washington, D.C., call for competition to cure issues with broadband value and build-out, but they don't recognize that the cost of building out competing networks may make broadband a natural monopoly or duopoly, said Robert Atkinson, president of the Information Technology and Innovation Foundation (ITIF).<br /><br />"It's a mistake for policymakers to assume that if they simply 'push the competition lever,' all the problems with broadband policy will be solved," wrote Atkinson, in an ITIF paper. "The bottom line is that if policymakers want to maximize not only societal welfare but also consumer welfare, they must balance the push for more competition with the need to maintain and create an efficient broadband industry structure."<br /><br />Atkinson and some other speakers at an ITIF broadband policy forum argued that the U.S. may need more broadband regulations to achieve higher speeds and lower prices. Atkinson suggested a balance between competition and stronger enforcement of consumer protection and antitrust laws. Another option would be to mandate open pipes, but Atkinson said that type of regulation isn't appropriate in the U.S. right now.<br /><br />Not everyone agreed that more regulation was appropriate. The suggestion that broadband is a natural monopoly or duopoly "as an economist gives me the willies," said John Mayo, professor of economics, business and public policy at Georgetown University.<br /><br />A government-supported monopoly in the traditional telephone market didn't work, Mayo said. He recalled an old Bell Atlantic billboard saying something to the effect of, "We don't sell you what you think you want; we sell you what we know you need."<br /><br />Broadband is still a relatively new technology and the broadband business model is still evolving, Mayo said. The industry doesn't need government regulation while it's still developing.<br /><br />Other speakers complained that U.S. residents get lower speeds for higher prices than many residents of Europe and the Far East. But Mayo noted that prices have been falling. "No matter how you measure it ... it's more affordable today than it's ever been," he said.<br /><br />Speakers at the forum noted that broadband policy is becoming an issue in the U.S. presidential campaign. This month, Sen. Hillary Clinton, the Democratic presidential front-runner, outlined a broadband policy that would include tax incentives for broadband carriers to move into rural and other underserved areas. Clinton also called for public and private partnerships to help roll out broadband and for the U.S. Federal Communications Commission to develop better data about where broadband is available.<br /><br />Several other candidates have talked about broadband as well, including Republican front-runner Rudy Giuliani, noted Jonathan Sallet, a partner in the Washington communications firm, the Glover Park Group.<br /><br />But many policymakers in Washington have recently taken a hands-off approach to broadband, thinking "let's create a neutral platform and just let stuff happen," added Steven Weber, a professor of political science at the University of California Berkeley. But just letting stuff happen isn't working to push broadband in many sectors, including health care, he said.<br /><br />"I don't think that argument is completely adequate to most people," he said.<br /><br />Correction: Due to a reporting error, this story as originally posted contained incorrect information regarding broadband regulation options presented by a policymaker. The article was amended on Oct. 22, 2007.<br /><br /><br /><br />The Role of Competition in a National Broadband Policy<br /><br /> By Robert D. Atkinson<br /><br />October 2007<br /><br />Read the full text of this report (PDF)<br />There is perhaps no issue more central to the debate about broadband policy than the state of and role of competition. Indeed, the issue of competition drives many of the debates over broadband, including net neutrality, wireless spectrum auctions, municipal broadband, and unbundling proposals. Although some advocates claim that the current state of broadband competition is more than adequate, others decry market conditions and seek proactive public policies to spur more competition. Yet almost everyone involved in broadband policy in the United States agrees that regardless of the current state of competition, more competition is better. The stated reason is that more competition leads to lower prices, higher speeds, broader deployment, more innovation, and better customer service.<br /><br />Yet, the Washington consensus in favor of more broadband competition ignores the fact that broadband displays natural monopoly or duopoly characteristics. Because of the nature of the broadband industry, there are significant tradeoffs between more competition and goals of efficiency, innovation, low prices, and higher speeds and broader deployment. Thus, it’s a mistake for policymakers to assume that if they simply “push the competition lever,” all the problems with broadband policy will be solved. Some problems will recede, but others are likely to emerge. The bottom line is that if policymakers want to maximize not only societal welfare but also consumer welfare, they must balance the push for more competition with the need to maintain and create an efficient broadband industry structure.<br /><br />This paper starts by reviewing the affordability of broadband in the United States. It then postulates two starkly different views toward broadband competition: the “engineers’ view” and the “economists’ view.” Finally, it reviews the four main policy options toward broadband competition: 1) keep the same number of “pipes”; 2) spur the deployment of more pipes; 3) force incumbents to open up existing pipes to competitors, and 4) regulate “duopoly” pipes. Although each policy track will achieve some benefits, each also brings with it costs and risks. Policymakers need to balance the desire for more competition to enhance consumer welfare in the broadband realm with the need for the most efficient broadband industry structure.<br /><br /><br />Read the full text of this report (PDF)John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-850352061859346182007-10-26T17:29:00.000-07:002007-10-26T17:31:17.732-07:00Web 2.0 Summit: U.S. Becoming Less Relevant In Global, Internet EconomyFrom Benton . . . . <br /><br /><a href="http://www.benton.org/node/7713">Web 2.0 Summit: U.S. Becoming Less Relevant In Global, Internet Economy</a><br /><br />The U.S. share of the global gross domestic product has declined steadily since 1999 to 19% today from 22%, according to Morgan Stanley research.<br />By Antone Gonsalves <br />InformationWeek <br /><br />The United States is losing its clout in the global economy and the Internet as other countries develop faster growing markets, a financial analyst said Thursday at the Web 2.0 Summit.<br />In a speech on technology trends, Mary Meeker, managing director of Morgan Stanley's global technology research team, said the U.S. has become less relevant over the years to the global economy.<br /><br />The U.S. share of the global gross domestic product has declined steadily since 1999 to 19% today from 22%. While this has been good news for other countries, it hasn't been a favorable trend for the U.S.<br /><br />"The good news for the global economy is we're less relevant, the bad news is we're less relevant," Meeker said.<br /><br />Going forward within the U.S., the country's current woes related to the subprime mortgage market "should not be underestimated" and it could have a serious impact on the U.S. GDP.<br /><br />In terms of the Internet -- especially in technologies key to Web 2.0 success -- the fastest growth is in non-U.S. markets. For example, Germany leads the e-commerce market, China leads in online gaming, South Korea leads in broadband, Japan leads in mobile payments, the United Kingdom leads in online advertising, Brazil and South Korea lead in social networking, and the Philippines leads in micro-transactions via SMS.<br /><br />America is not totally out of the picture. Online advertising is growing at a healthy clip in the U.S., growing 26% this year to 10% of the total ad market, or $21 billion, Meeker said. The total U.S. advertising market this year is expected to grow by 4%. By 2012, online advertising is expected to make up 17% of the total ad spend in the U.S.<br /><br />As to the growing importance of new Internet companies, Meeker pointed to the number of social networks and other Web 2.0 properties that weren't in the top 10 rankings in terms of traffic in 2005, but are this year. Those companies include YouTube, No. 4; Live.com, No. 5; Facebook.com, No. 7; Orkut.com, No. 8; Wikipedia.org, No. 9; and Hi5.com, No. 10, according to Alexa Global Traffic Rankings.<br /><br />Meeker's presentation is available online.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com1tag:blogger.com,1999:blog-8469509065712613395.post-31654690912300211942007-10-26T17:25:00.000-07:002007-10-26T17:29:07.437-07:00Comcast blocks some Internet trafficFrom MSNBC . . . . . <br /><br /><a href="http://www.msnbc.msn.com/id/21376597/">Comcast blocks some Internet traffic</a><br /><br />Tests confirm data discrimination by number 2 U.S. service provider<br /> <br />Matthew Elvey, a Comcast subscriber in the San Francisco area who has noticed BitTorrent uploads being stifled, acknowledged that the company has the right to manage its network, but said he disapproves of its method.<br />By Peter Svensson<br /><br /><br />NEW YORK - Comcast Corp. actively interferes with attempts by some of its high-speed Internet subscribers to share files online, a move that runs counter to the tradition of treating all types of Net traffic equally.<br /><br />The interference, which The Associated Press confirmed through nationwide tests, is the most drastic example yet of data discrimination by a U.S. Internet service provider. It involves company computers masquerading as those of its users.<br /><br />If widely applied by other ISPs, the technology Comcast is using would be a crippling blow to the BitTorrent, eDonkey and Gnutella file-sharing networks. While these are mainly known as sources of copyright music, software and movies, BitTorrent in particular is emerging as a legitimate tool for quickly disseminating legal content.<br /><br />The principle of equal treatment of traffic, called "Net Neutrality" by proponents, is not enshrined in law but supported by some regulations. Most of the debate around the issue has centered on tentative plans, now postponed, by large Internet carriers to offer preferential treatment of traffic from certain content providers for a fee.<br /><br />Comcast's interference, on the other hand, appears to be an aggressive way of managing its network to keep file-sharing traffic from swallowing too much bandwidth and affecting the Internet speeds of other subscribers.<br /><br />Number two provider<br />Comcast, the nation's largest cable TV operator and No. 2 Internet provider, would not specifically address the practice, but spokesman Charlie Douglas confirmed that it uses sophisticated methods to keep Net connections running smoothly.<br /><br />"Comcast does not block access to any applications, including BitTorrent," he said.<br /><br />Douglas would not specify what the company means by "access" — Comcast subscribers can download BitTorrent files without hindrance. Only uploads of complete files are blocked or delayed by the company, as indicated by AP tests.<br /><br />But with "peer-to-peer" technology, users exchange files with each other, and one person's upload is another's download. That means Comcast's blocking of certain uploads has repercussions in the global network of file sharers.<br /><br />Comcast's technology kicks in, though not consistently, when one BitTorrent user attempts to share a complete file with another user.<br /><br />Each PC gets a message invisible to the user that looks like it comes from the other computer, telling it to stop communicating. But neither message originated from the other computer — it comes from Comcast. If it were a telephone conversation, it would be like the operator breaking into the conversation, telling each talker in the voice of the other: "Sorry, I have to hang up. Good bye."<br /><br />Matthew Elvey, a Comcast subscriber in the San Francisco area who has noticed BitTorrent uploads being stifled, acknowledged that the company has the right to manage its network, but disapproves of the method, saying it appears to be deceptive.<br /><br />"There's the wrong way of going about that and the right way," said Elvey, who is a computer consultant.<br /><br />All types of content<br />Comcast's interference affects all types of content, meaning that, for instance, an independent movie producer who wanted to distribute his work using BitTorrent and his Comcast connection could find that difficult or impossible — as would someone pirating music.<br /><br />Internet service providers have long complained about the vast amounts of traffic generated by a small number of subscribers who are avid users of file-sharing programs. Peer-to-peer applications account for between 50 percent and 90 percent of overall Internet traffic, according to a survey this year by ipoque GmbH, a German vendor of traffic-management equipment.<br /><br />"We have a responsibility to manage our network to ensure all our customers have the best broadband experience possible," Douglas said. "This means we use the latest technologies to manage our network to provide a quality experience for all Comcast subscribers."<br /><br />The practice of managing the flow of Internet data is known as "traffic shaping," and is already widespread among Internet service providers. It usually involves slowing down some forms of traffic, like file-sharing, while giving others priority. Other ISPs have attempted to block some file-sharing application by so-called "port filtering," but that method is easily circumvented and now largely ineffective.<br /><br />Comcast's approach to traffic shaping is different because of the drastic effect it has on one type of traffic — in some cases blocking it rather than slowing it down — and the method used, which is difficult to circumvent and involves the company falsifying network traffic.<br /><br />The "Net Neutrality" debate erupted in 2005, when AT&T Inc. suggested it would like to charge some Web companies more for preferential treatment of their traffic. Consumer advocates and Web heavyweights like Google Inc. and Amazon Inc. cried foul, saying it's a bedrock principle of the Internet that all traffic be treated equally.<br /><br />To get its acquisition of BellSouth Corp. approved by the Federal Communications Commission, AT&T agreed in late 2006 not to implement such plans or prioritize traffic based on its origin for two and a half years. However, it did not make any commitments not to prioritize traffic based on its type, which is what Comcast is doing.<br /><br />The FCC's stance on traffic shaping is not clear. A 2005 policy statement says that "consumers are entitled to run applications and services of their choice," but that principle is "subject to reasonable network management." Spokeswoman Mary Diamond would not elaborate.<br /><br />Opposition<br />Free Press, a Washington-based public interest group that advocates Net Neutrality, opposes the kind of filtering applied by Comcast.<br /><br />"We don't believe that any Internet provider should be able to discriminate, block or impair their consumers ability to send or receive legal content over the Internet," said Free Press spokeswoman Jen Howard.<br /><br />Paul "Tony" Watson, a network security engineer at Google Inc. who has previously studied ways hackers could disrupt Internet traffic in manner similar to the method Comcast is using, said the cable company was probably acting within its legal rights.<br /><br />"It's their network and they can do what they want," said Watson. "My concern is the precedent. In the past, when people got an ISP connection, they were getting a connection to the Internet. The only determination was price and bandwidth. Now they're going to have to make much more complicated decisions such as price, bandwidth, and what services I can get over the Internet."<br /><br />Several companies have sprung up that rely on peer-to-peer technology, including BitTorrent Inc., founded by the creator of the BitTorrent software (which exists in several versions freely distributed by different groups and companies).<br /><br />Ashwin Navin, the company's president and co-founder, confirmed that it has noticed interference from Comcast, in addition to some Canadian Internet service providers.<br /><br />"They're using sophisticated technology to degrade service, which probably costs them a lot of money. It would be better to see them use that money to improve service," Navin said, noting that BitTorrent and other peer-to-peer applications are a major reason consumers sign up for broadband.<br /><br />BitTorrent Inc. announced Oct. 9 that it was teaming up with online video companies to use its technology to distribute legal content.<br /><br />Affecting others<br />Other companies that rely on peer-to-peer technology, and could be affected if Comcast decides to expand the range of applications it filters, include Internet TV service Joost, eBay Inc.'s Skype video-conferencing program and movie download appliance Vudu. There is no sign that Comcast is hampering those services.<br /><br />Comcast subscriber Robb Topolski, a former software quality engineer at Intel Corp., started noticing the interference when trying to upload with file-sharing programs Gnutella and eDonkey early this year.<br /><br />In August, Topolski began to see reports on Internet forum DSLreports.com from other Comcast users with the same problem. He now believes that his home town of Hillsboro, Ore., was a test market for the technology that was later widely applied in other Comcast service areas.<br /><br />Topolski agrees that Comcast has a right to manage its network and slow down traffic that affects other subscribers, but disapproves of their method.<br /><br />"By Comcast not acknowledging that they do this at all, there's no way to report any problems with it," Topolski said.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-4277424448267500572007-10-26T17:23:00.000-07:002007-10-26T17:25:35.326-07:00Comcast impersonates users' computers to block internet file sharingThe Raw Story . . . .<br /><br /><a href="http://rawstory.com/news/2007/Comcast_impersonates_users_to_block_internet_1019.html">Comcast impersonates users' computers to block internet file sharing</a><br /><br />Comcast subscribers have been complaining since last summer that the country's second-largest Internet service provider is deliberately cutting off peer-to-peer file sharing. Now a study by the Associated Press has confirmed those reports.<br /><br />Peer-to-peer networks can be used for unauthorized distribution of copyrighted materials but also have many legitimate uses. File-sharing is now estimated to account for as much as 90% of Internet traffic, and many ISP's attempt to preserve bandwidth by slowing it down.<br /><br />The Associated Press found that Comcast is using an even more drastic method, which can prevent file-sharing almost entirely by sending fake messages to both computers involved in a peer-to-peer transaction, telling them to drop the connection.<br /><br />Comcast is not blocking its subscribers' downloads, only their uploads. This means that non-Comcast subscribers all over the world who seek to access those files may be the ones hardest hit.<br /><br />Posters at the technology geek website Slashdot generally believe that the real problem lies in the fact that ISP's have over-promoted bandwidth-intensive services beyond what the current infrastructure can handle and are now trying to artificially limit the use of those same services rather than acknowledging the need for upgrades.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-75279107325093831112007-10-26T17:19:00.000-07:002007-10-26T17:23:19.130-07:00Taking a Whack Against Comcast<a href="http://www.washingtonpost.com/wp-dyn/content/article/2007/10/17/AR2007101702359_2.html">Taking a Whack Against Comcast</a><br /><br /><br /><br /><br />The insulting idea that, as Shaw puts it, "they thought just because we're old enough to get Social Security that we lack both brains and backbone."<br /><br />So, after stewing over it all weekend, on the following Monday, she went downstairs, got Don's claw hammer and said: "C'mon, honey, we're going to Comcast."<br /><br />Did you try to stop her, Mr. Shaw?<br /><br />"Oh no, no," he says.<br /><br />Hammer time: Shaw storms in the company's office. BAM! She whacks the keyboard of the customer service rep. BAM! Down goes the monitor. BAM! She totals the telephone. People scatter, scream, cops show up and what does she do? POW! A parting shot to the phone!<br /><br />"They cuffed me right then," she says.<br /><br />Her take on Comcast: "What a bunch of sub-moronic imbeciles."<br /><br />Being a responsible newspaper, we must note that this is a misdemeanor, a crime, a completely inappropriate way of handling a business dispute.<br /><br />Noted.<br /><br />Who among us has not longed for a hammer in this age of incompetent "customer service representatives," of nimrods reading from a script at some 800-number location, of crumbs-in-their-beards plumbing installation people who tell you they'll grace you with their presence between 12 and 3, only never to show? And you'll call and call and finally some outsourced representative slings a dart at a calendar and tells you another guy will come back between 10 and 2 next Thursday? And when this guy comes, pants halfway down his behind, he'll tell you he brought the wrong part?<br /><br />And there is nothing, nothing you can do.<br /><br />Until there! On the horizon! It's Hammer Woman, avenger of oppressed cable subscribers everywhere! (Cue galloping "Lone Ranger" theme.)<br /><br />"I scared the tar out of some people, at least," she says. "It had never occurred to me to take a hammer to a phone company before, but I was just so upset. . . . After I hit the keyboard, I turned to this blonde who had been there the previous Friday, the one who told me to wait for the manager, and I said, ' Now do I have your attention?' "<br /><br />It wasn't all fun.<br /><br />"My blood pressure went up around my ears. I started hyperventilating. They had to call the rescue squad and put me on a litter."<br /><br />By the time it was over, she recalls, there were an ambulance, two police cruisers and a sergeant's car in the parking lot. Shaw received a three-month suspended sentence for disorderly conduct, a $345 fine in restitution and a year-long restraining order barring her from the Comcast office.<br /><br />"Truly a unique and inappropriate situation," says Beth Bacha, a vice president for Comcast. She says company policy forbids disclosure of clients' records, but did say their files note that the service record wasn't exactly what Shaw has indicated. Besides, "nothing justifies this sort of dangerous behavior."<br /><br />Bacha noted that Comcast has more than 25 million customers, the overwhelming majority of which are very satistified with their service.<br /><br />Manassas police spokesman Sgt. Tim Neumann says there have been other police calls to that Comcast office, but he doesn't know what prompted them.<br /><br />Bob Garfield, who runs ComcastMustDie.com, wrote last week he was happy the site had become an outlet for "so much deep-seated rage," but hoped customers would "keep the hammer assaults down to a bare minimum."<br /><br />From what we can tell, Mona Shaw is not, actually, a raving lunatic armed with construction tools.<br /><br />She is a nice lady who lives in a nice house. She and Don are both retired from the Air Force (she was a registered nurse). They have been married 45 years. She is secretary of the local AARP, secretary of a square-dancing club and takes in strays for the local animal shelter (they have seven dogs at the moment). She has a heart condition. She lifts weights at a local gym. The couple attend a Unitarian Universalist church.<br /><br />Police gave her the hammer back, though she swears she's content to ride off into the sunset of True Crime Stories in America, never again to go Com-smash-tic on her local cable provider.<br /><br />She does, however, finally, have phone serviceJohn Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-77605631031231079032007-10-26T17:09:00.000-07:002007-10-26T17:17:48.781-07:00AppleFrom The Joy of Tech via <a href="http://bigpicture.typepad.com/.shared/image.html?/photos/uncategorized/2007/09/06/915.gif">The Big Picture</a>. <br /><br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHbkUmkKlp_MlXiLJfpFIl8pgJJjc7-FzCUpldjLFH_jZso-jBwIKFS2JmzN7T4Qo_GoQq5Um43BVVsz4R81OTnhQKgjjNVCo6IbyXZIZ1Ql57iCYmxeUph8etz3GdITn9pRIhH9ABBR_S/s1600-h/915.gif"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHbkUmkKlp_MlXiLJfpFIl8pgJJjc7-FzCUpldjLFH_jZso-jBwIKFS2JmzN7T4Qo_GoQq5Um43BVVsz4R81OTnhQKgjjNVCo6IbyXZIZ1Ql57iCYmxeUph8etz3GdITn9pRIhH9ABBR_S/s320/915.gif" border="0" alt=""id="BLOGGER_PHOTO_ID_5125803490304839762" /></a>John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0tag:blogger.com,1999:blog-8469509065712613395.post-3909387792467063502007-10-26T17:07:00.000-07:002007-10-26T17:09:43.035-07:00The smartest guys in the roomFrom Techdirt . . . .<br /><br /><a href="http://www.techdirt.com/articles/20071005/013707.shtml">Exploiting Telco Regulations For Free Calls And For Profit (Lots And Lots Of Profit)</a><br /><br />from the so-easy,-it's-almost-criminal... dept<br />Earlier this year, we wrote about how suddenly a bunch of "free" calling services were popping up that all seemed to use phone numbers in Iowa. This included a service that would let you call an Iowa number and from there call anywhere in the world for free as well as a variety of "free conference calling" services. All of these systems were actually exploiting some legacy telco regulations, that were officially designed to help rural telcos get extra money to build out more rural service. Basically, the government allowed rural telcos to charge high termination fees to other telcos when calls from their lines terminated on one of the rural telco's lines. So, if you had AT&T and called your cousin in Iowa who had some small rural telco, AT&T would actually have to pay that telco some charge per minute, with the idea being that the telcos would use that money to invest in infrastructure. Of course, the infrastructure they invested in wasn't exactly building more lines to wire up others in the town, but in VoIP systems so they could reroute calls in to anywhere else, and then team up with various online sites to get as many calls as possible routed through those systems. Then they could just sit back and collect the millions of dollars rolling in from telcos. Broadband Reports points us to an article at the Wall Street Journal going into more details about how this happened -- and how the FCC is now scrambling a bit to see if there's a way they can stop it. In the meantime, the WSJ piece notes that while the telcos have been told by the FCC that they have to keep connecting these calls, they've simply stopped paying any of the termination fees as they await the results of the various lawsuits. Of course, all that's done for now is made the various free conference call services switch to other rural telcos in other states. Eventually, though, they'll run out of other states to go to (or the regulators will finally realize how their regulations are being exploited) and the little regulatory exploit will go away.John Doehttp://www.blogger.com/profile/10027163738025130731noreply@blogger.com0