Feeds

Comcast busted for bagging BitTorrents (again)

'We manage, but we don't block.'

Eight steps to building an HP BladeSystem

New tests have confirmed that Comcast is throttling file-sharing traffic.

Citing tests run on machines across the US, The Associated Press reported today that the big-name internet service provider "actively interferes" with attempts to swap files over P2P networks like BitTorrent, eDonkey, and Gnutella.

The Reg first discussed this phenomenon in late August, after a post on the Dutch file-sharing blog TorrentFreak.

But claims of Comcast P2P throttling go all the way back to the late spring, when a independent tester named Robb Topolski told readers on DSLReports that the ISP was using a networking management tool called Sandvine to prevent BitTorrent users from "seeding" files - i.e. making them available to other users.

This afternoon, Comcast told us the much same thing it told us in August. "Comcast does not block access to any Websites or online applications, including peer-to-peer services like BitTorrent," reads the company's canned statement.

But no one is accusing the ISP of "blocking" access to web sites or applications. At issue is whether it's interfering with traffic. Later in the statement, Comcast does cop to "managing" traffic, but it says this is simply part of an effort to provide it's users with a really good time.

"Our customers use the Internet for downloading and uploading files, watching movies and videos, streaming music, sharing digital photos, accessing numerous peer-to-peer sites and thousands of applications online," the statement continues. "We have a responsibility to provide all of our customers with a good Internet experience and we use the latest technologies to manage our network so that they can continue to enjoy these applications." ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.