<P>to my understanding, wiretaping the network connection and record anything transferred is a requirement from ISP who want to charge anything it want.
<P>Network storage is value-added sevice provided by ISPs.
<P>The problem is: how could we find a blanance point between service/charge and
<P>the law. Some government asks ISPs to block some sites absolutely, and ISPs
<P>want to charge some content while ICPs charge realtime service. the possible
<P>solution is filtering content,which is really difficult.
<P>Jing Shen
<P> <B><I>Jon Crowcroft <Jon.Crowcroft@cl.cam.ac.uk></I></B> wrote:
<BLOCKQUOTE style="BORDER-LEFT: #1010ff 2px solid; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">wrong model - <BR><BR>I WANT the feds to record all my traffic- then i can stop doing backup - i bet if they<BR>outsource the storage beusiness properly, they can get a better deal than me<BR><BR>oh, but i want to prove that the y have strong partitioning of data by insisting on<BR>occasional (random) retrievals to check they have my data right.<BR><BR>of course, they can bill me for that, but i can ask GCHQ, MOSSAD, NSA, , etc etc<BR>and see who does the cheapest service<BR><BR>i dont see why intelligence agencies shouldnt be subject to free market forces just like<BR>the rest of us.<BR><BR>In missive <5.2.0.9.2.20030131153651.03977c70@127.0.0.1>, "David P. Reed" typed:<BR><BR>>>Recording user traffic would seem to be bad citizenship, and also a source <BR>>>of liability - if it got mishandled it could make the copier liable for <BR>>>whatever damages are caused.<BR>>><BR>>>It's hard to believe that billing requires access to contents. Billing <BR>>>should work even if end-to-end encrypted, one would think.<BR>>><BR>>>Instead, one could require that the traffic be authenticated at the billing <BR>>>point - perhaps by wrapping it in IPSEC up to that point.<BR>>><BR>>>At 10:22 AM 1/31/2003 -0500, ram.gopal@nokia.com wrote:<BR>>>>Greetings,<BR>>>><BR>>>>For billing and other similar application, network element (eg., <BR>>>>routers)may need to duplicate user traffic<BR>>>>to such application. But this seems like wiretapping and may not be <BR>>>>considered legal. Is there any technical<BR>>>>solution for this?<BR>>>><BR>>>>Thanks in advance.<BR>>>>Regards<BR>>>>Ramg<BR>>>><BR>>>><BR>>>><BR>>><BR><BR>cheers<BR><BR>jon<BR></BLOCKQUOTE><BR><BR>Jing Shen<br><br>State Key Lab of CAD&CG<br>ZheJiang University(YuQuan)<br>HangZhou, ZheJiang Province 310027<br>P.R.China<p><br><hr size=1><b>Do You Yahoo!?</b><br>
<a href="http://rd.yahoo.com/mail_cn/tag?http://cn.promo.yahoo.com/holiday/">"ÑÅ»¢½ÚÈÕ´óתÅ̾ªÏ²²»¶Ï ¿ìÀÖ½ÚÈÕºÃÀñÁ¬Á¬!"</a>