Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
-
@freya having ISPs be anything more than ISPs was a mistake
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten ah you can’t DPI your customers anymore? boohoohoo, let me play the worlds smallest violin for you and the Spanish football league
-
@freya having ISPs be anything more than ISPs was a mistake
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
they're even against HTTP/3 now -
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
-
@freya having ISPs be anything more than ISPs was a mistake
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten The jokes of them cutting down the internet whenever a match plays are increasingly real... i have decided i am against Telefónica as a concept.
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten@social.elizabeth.cat I misread "piracy" as "privacy" at first and neither make sense. ISPs should never have the right to break or deny encryption, if I do something illegal then they have their legal protections in place and I get all the consequences for my own actions
-
@kitten our ISP is run by like, one dude. He provides a sim card, an AP, an IP address and gets the fuck out of our way
@freya sounds like heaven -
@freya sounds like heaven
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten dear me
-
@kitten@social.elizabeth.cat I misread "piracy" as "privacy" at first and neither make sense. ISPs should never have the right to break or deny encryption, if I do something illegal then they have their legal protections in place and I get all the consequences for my own actions
@mitsunee that's the thing, they also sell football and TV shows now, so they have stake in blocking pirated content -
they're even against HTTP/3 nowThis post did not contain any content.
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten considering the mess they are causing in Spain rn by being overzealous with blocking "anything" that streaming sites uses to pirate football matches (and with everything, it also means blocking CloudFare, which is affecting a ton of clients and companies), yeah, that checks out
Then again, this isn't anything new. They have been forever shitty since it got privatised, so everybody who can, goes with other ISPs
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten@social.elizabeth.cat I mean the argument that legal organizations should consider the technical constraints as a key factor before applying ridiculous, completely unenforceable policy is actually a good point... I just suspect that's not what they're trying to archive here
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.
@kitten that's very ISP of them. I'd also expect DoT and DoH to make an appearance. But I gotta admit that HTTP/3 caught me off guard.
But yeah, it's not just them... ISPs are a big reason why ECH has been controversial. But this one serves the interests of CDN providers (CloudFlare) which had the weight to push it through.
I have some ideas for draft proposals that would probably not be so lucky. Internet standards are often adversarial, and without *any* corporate interest it's... difficult.
-
Telefónica has decided they are against uhhh -checks notes- the Internet as a concept
For example, the operation of so-called Virtual Private Networks (VPNs), which conceal real location; the use of TLS protocol modifications such as ECH (Encrypted Client Hello), which hides information to ISPs in HTTPS connections; and the use of QUIC, which runs over UDP and facilitates concealment of the connection.
The technical foundations of these new technologies prevent ISPs from adopting protective measures against illicit content, such as online piracy. Therefore, any legal instrument must consider this technical constraint as a key factor in the effectiveness of protective measures.