Feeds

P2P file-sharing recognizes no borders

Everyone is doing it

Mobile application security vulnerability report

Peer-to-peer applications dominate internet traffic even in generally lower-bandwidth areas, according to a recent study by German web traffic analyst ipoque.

The firm studied three petabytes of anonymous data from ISPs and universities in Southern and Eastern Europe, the Middle East and Australia between August and September of this year. They estimate the research analyzes over one million users.

The study showed that the total share eaten by p2p ranges from 49 per cent in the Middle East to 84 per cent in Eastern Europe. At nighttime, p2p traffic jumps as high as 95 per cent of total bandwidth used.

Daylight slays p2p traffic

Those old standbys: movies, pornography and music take up the largest proportion of files swapped. E-Books take an uncommonly high share of traffic in the Middle East, while computer games take a disproportionate chunk of Southern Europe.

Doubtlessly to spurn prying eyes and bandwidth-pinching internet providers, the firm found about 20 per cent of BitTorrent and eDonkey traffic is already encrypted in the regions. For comparison, about 40 per cent of BitTorrent traffic in the UK gets the same treatment.

They took a peek at instant messengers and internet telephony as well. Although Voice over IP (VoIP) calls account for only one per cent of internet traffic, the application Skype represents 95 per cent of it. The popularity of instant messengers vary from region to region. In the Middle East 60 per cent of internet users use IMs, while only 17 per cent of Germans do. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.