It has long been known that Internet providers are slowly, secretly from users, filtering traffic from P2P networks. Surely, this is happening even in Russia, although such cases have never been openly discussed, and society has not developed its assessment of what is happening.
But in America, the
discussion is in full swing . There, they not only obtained evidence of filtration, but began to study specific technical methods for its implementation. For example, an interesting fact has recently come to light: it turns out that the Comcast provider uses
counterfeit TCP Reset (RST) packets to deal with torrents. This is the method used by the Chinese authorities in the work of the Great Chinese Firewall.
The question arises: do providers have the right to fake user traffic? After all, filtering and blocking packets is one thing, but faking traffic is completely different. Technical administrators of the provider company, managers and even management can be
brought to criminal liability for such. On the other hand, what they have to do if P2P traffic accounts for
up to 90% of all traffic in data networks .