Regards
Craig
On Mar 16, 2016, at 10:09 PM, Manfredi, Albert E
<albert.e.manfredi@xxxxxxxxxx> wrote:
No, Craig. As always, first inform yourself, then argue. I explained exactly
how it works.
Deep Packet Inspection (and filtering) enables advanced network management,So the informed takeaway is that it works in many ways, most of which can be
user service, and security functions as well as internet data mining,
eavesdropping, and internet censorship. Although DPI technology has been used
for Internet management for many years, some advocates of net neutralityfear
that the technology may be used anticompetitively or to reduce the openness
of the Internet
DPI is used in a wide range of applications, at the so-called "enterprise"
level (corporations and larger institutions), in telecommunications service
providers, and in governments.
Gathering metadata does not require deep packet inspection.
If a user goes to Google to make a search, only Google should know what that
user is searching for, because the session is between a Google server and the
user.
The ISP between the two should have no idea of what search criteria the user
types into the search engine. *At best*, the ISP may track what other
server(s) the user goes to after the fact, which does *not* require deep
packet inspection!
AT&T wants the ability to do deep packet inspection, to see (for example)
what users are searching for, when the go to Google servers.
Since this is what the article said, it would behoove you to look up "deep
packet inspection" first, then take the article to task for spreading lies.
And then prove it, of course.
Yes that is a well know application. In my searches about DPI I read about this
While it is technically possible to "eavesdrop,"
That's the *only reason* for deep packet inspection. It is what security
gateways have to do, for example, to protect secure enclaves. They look at
the payload of all incoming and outgoing packets, searching for certain
pre-programmed keywords. They block whatever isn't kosher.
If the article had not mentioned deep packet inspection, I would not have
bothered to comment.
On the other hand, if an ISP is allowed to read the payload of your
transitting packets, they have access to everything your do.
Sorry, Any differences are superficial at best.
The differences are fundamental. Deep packet inspection allows complete
eavesdropping, just like phone tapping.
You can use e-mail services that are encrypted or Apps. This e-mail
message is encrypted in transit,
Which is close to useless. Your email arrives as plaintext at my end, which
means that anyone can snoop. I use Verizon DSL. Verizon can snoop and read
all my emails. They shouldn't be allowed that.
Security has to be end to end to be effective. PRECISELY the same as secure
telephone. How worthless would secure telephones be, if the conversation is
decrypted before it reaches the other side? Totally worthless. Exactly the
same applies to IP sessions. End to end security, or the ISP can snoop. And
as a user, Craig, you usually have NO CONTROL over whether or not you can
implement end to end security.
I already explained all of this. Before arguing, inform yourself.