lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <404FC92B.8010304@nbnet.nb.ca>
From: smenard at nbnet.nb.ca (Steve Menard)
Subject: Comcast using IPS to protect the Internet	from
 their home user clients?

Frank Knobbe wrote:

>Spam filtering and virus checking should occur on the carriers email
>gateways/hosts, and not on the wire itself. I should have the right to
>receive all the viruses I want in my email (perhaps for legitimate
>research). As far as filtering inline, if it occurs on fixed critera
>(i.e. port 25), I'm okay with it (even though I may not like it. As I
>said, as long as I can tunnel around it, I'm fine :)  
>
>But if filtering occurs inline on undefined critera, then it may be of
>concern. That is the reason that I posted the question if anyone else
>had noticed that "some" filtering on "some" content is occurring.
>
>Cheers,
>Frank
>
>
>  
>
Sure enough that's what happens in Aliant Bell-Sympatico land here in 
Eastern Canada
Of course they won't tell the end-user it would squash their demand for 
Phone/Net Bill upcharges with monthly anti-virus add-on charges $4.99/month

And of course there's no indication that' it's turned on except when 
some knowledgeable user expects to receive such malware through 
'regular'  channels and it fails to materialize.
 
So Any body want to preove me wrong and send me malware ;-)

cc it to my account [non [baby-canadian-Bell] supervised]
 realmalware at www dot dranem dot org 
So I know what was supposed to be sent   ;-)

smenard


Powered by blists - more mailing lists