Support

Archive | Net Neutrality

View all postings from the Net Neutrality category in “Security to the Core,” the Arbor Networks Security Engineering and Response Team Blog.

Lessons learned from the FCC decision

In the FCC ruling today, the commission criticized both the technology and the transparency of Comcast’s network management practices.  Network management in and of itself is not a problem, as the Commission has said in their FCC principles protecting consumer access to the Internet. The particular method used by Comcast is at the heart of […]

Continue Reading

Hunting Unicorns: Myths and Realities of the Net Neutrality Debate

In many ways, the emotionally charged debate on Network Neutrality (NN) has been a lot like hunting Unicorns. While hunting the mythical horse could be filled with adrenalin, emotion, and likely be quite entertaining, the prize would ultimately prove to be elusive. As a myth, entertaining; but when myths become reality, then all bets are […]

Continue Reading

U.S. Broadband Not Soooo Bad..

Yesterday ITIF published a special report titled Explaining International Broadband Leadership. The report was aimed at digging into why the U.S. ranked a dismal 15th in broadband performance among OECD nations, as indicated in reports available here, and what variables might spur expanded broadband performance. In addition, discussion is provided on what models other nations […]

Continue Reading

Net Neutrality’s Unintended Consequence

Most of the discussion surrounding net neutrality to date seems to revolve around fixed broadband consumers complaining that ISPs are unjustly mucking with their traffic, discriminating between different traffic types, and providing prioritization without their consent — and the providers shouldn’t be. Rob took a bit of a consumer-centric view to practically addressing net neutrality […]

Continue Reading

5 Ways to Molest Internet Users

A good bit of the attention garnered by DMK’s ToorCon presentation focused on how ISPs are employing Provider-In-The-Middle Attacks (PITMAs) to collect ad-related revenue from their customers, and how security “of the web” ends up being fully gated by the security of the ad server folks. While I completely agree with this, I would emphasize […]

Continue Reading