Thoughts on combating packet discrimination
No, I can't save you. But I believe that we can save ourselves, if we collaborate. Here are a few of my ruminations on the recent uproar over the Vergoogle/Googizon usurpation of so-called net-neutrality, and the coming Info War.
Contents
The proposed management of services
- Currently the proposed policy pertains only to the modern wireless network (in the USA). On the legacy wired network, we peons can have all the net neutrality we want. It reminds me of Logan's Run, where there are the citizens of the utopian society, and there are the excluded underground denizens who must subsist off the scraps and waste of the domed cities, and remain in hiding.
Deep Packet Inspection and the need to darken unsanctioned traffic
To my knowledge, very few wireless systems have the computing power to perform real-time intelligent traffic prioritization or QoS (with the exception of perhaps, Exalt Inc.) on encrypted traffic. This means that when the Big Filter is erected (not unlike the great Digital Wall of China) that decides what traffic is passed with priority (if at all), it will require greater computing capacity withing the backbone to inspect encrypted traffic and enforce policy. Current practice, for example, as was in the case of Comcast, is to exclude or retard bit torrent traffic (under the assumption that all such traffic is illegitimate).
I foresee in the near future, an underground movement where real news and perhaps resistence, will have to go dark, that is, be transmitted using peer-to-peer, encryption, onion routing, etc - most likely, all of which will become illegal and or unofficially subject to filtering.
Real-time steganography
I have not seen any discussion on this idea yet, perhaps because the need for it has not yet been anticipated. Currently, most bit torrent traffic is static data - music, videos, etc. There are a few exceptions to this; I believe that skype calls and chats are real-time p2p encrypted traffic, but I don't know of any others aside from general TOR traffic.
Traditionally, people who wished to hide messages in plain sight used steganography techniques that encoded messages into the low bits of ordinary jpg's. No amount of inspection would be able to distinguish this use of a static jpg file. Naturally, any transcoding or resizing of the image destroys the original message. Perhaps in the very near future it will be necessary to hide dynamic traffic "in plain sight" - in real-time video data, such as is used in video teleconferencing. I think it could be done, and probably will have to be done.
Private volunteer wireless p2p networking
Eventually, possibly sooner than we think, it will be necessary to move excluded traffic via a p2p mesh composed of short-range spread spectrum radio, since the cellular data networks and wired backbone will essentially become privatized. This "HAM radio" network of the 21st century will largely be composed of radios that are purchased and operated at the volunteer's own expense. Many of those radios could be modified android phones - the new underground railroad, if you will.