Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
-
@freya having ISPs be anything more than ISPs was a mistake
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten The jokes of them cutting down the internet whenever a match plays are increasingly real... i have decided i am against Telefónica as a concept.
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten@social.elizabeth.cat I misread "piracy" as "privacy" at first and neither make sense. ISPs should never have the right to break or deny encryption, if I do something illegal then they have their legal protections in place and I get all the consequences for my own actions
-
@kitten our ISP is run by like, one dude. He provides a sim card, an AP, an IP address and gets the fuck out of our way
@freya sounds like heaven -
@freya sounds like heaven
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten dear me
-
@kitten@social.elizabeth.cat I misread "piracy" as "privacy" at first and neither make sense. ISPs should never have the right to break or deny encryption, if I do something illegal then they have their legal protections in place and I get all the consequences for my own actions
@mitsunee that's the thing, they also sell football and TV shows now, so they have stake in blocking pirated content -
they're even against HTTP/3 nowThis post did not contain any content.
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten considering the mess they are causing in Spain rn by being overzealous with blocking "anything" that streaming sites uses to pirate football matches (and with everything, it also means blocking CloudFare, which is affecting a ton of clients and companies), yeah, that checks out
Then again, this isn't anything new. They have been forever shitty since it got privatised, so everybody who can, goes with other ISPs
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten@social.elizabeth.cat I mean the argument that legal organizations should consider the technical constraints as a key factor before applying ridiculous, completely unenforceable policy is actually a good point... I just suspect that's not what they're trying to archive here
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten that's very ISP of them. I'd also expect DoT and DoH to make an appearance. But I gotta admit that HTTP/3 caught me off guard.
But yeah, it's not just them... ISPs are a big reason why ECH has been controversial. But this one serves the interests of CDN providers (CloudFlare) which had the weight to push it through.
I have some ideas for draft proposals that would probably not be so lucky. Internet standards are often adversarial, and without *any* corporate interest it's... difficult.
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
-
@kitten that's very ISP of them. I'd also expect DoT and DoH to make an appearance. But I gotta admit that HTTP/3 caught me off guard.
But yeah, it's not just them... ISPs are a big reason why ECH has been controversial. But this one serves the interests of CDN providers (CloudFlare) which had the weight to push it through.
I have some ideas for draft proposals that would probably not be so lucky. Internet standards are often adversarial, and without *any* corporate interest it's... difficult.
@kitten omg... I just noticed "TLS protocol modifications"... missed that detail the first time.
They make it sound like ECH is some clandestine stuff, rather than a literal standards track internet draft that is on the verge of RFC.
Don't go "tampering" with TLS, using... *checks notes* ...standard TLS extensions! LMAO
-
@kitten honestly that last sentence makes it read more as "theres nothing we can do about this so sucks2bu government"@coolbean nono, there's something they are doing, which is plain IP address blocking, including blocking Cloudflare, and using that as legal justification.
they are the ones who care about blocking that stuff because they are the ones who have exclusivity for stuff like football and some TV shows -
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten I wonder how this stuff works.
Back when I was still a mobile customer with them, they had a clause in their contract that you weren't allowed to do voice over IP on their network.
I just ignored it, because they aren't really allowed enforce that in Germany as far as I know. My understanding is that as soon as they block things, they become liable to whatever people do on their network, which isn't the case if all they do is forward traffic.I guess, in the end, this sort of thing doesn't work in Germany, but nobody cares because nobody reads the whole contract anyway.
-
M magiclike@soc.sekundenklebertransportverbot.de shared this topic
-
@kitten it's delightful. 400 down, 100 up, the only email we ever got from him was to let us know that he noticed high upload, we were like "yeah we're backing up our server" and he was like "oh ok cool"