-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Tue, Jun 8, 2010 at 5:45 PM, Dorn Hetzel <dhetzel@gmail.com> wrote:
Perhaps a government operated black-hole list, run by same friendly folks that run the no-fly list, with a law that says no US ISP can send packets to or accept packets from any IP on the list. Now that would be some real fun to watch! :)
Personally, I think that's a horrible idea -- there's a real slippery slope to subjective blocking of "offensive" sites (not just malicious ones) like what they are trying to do in Australia. But again, since U.S. providers have demonstrated that they do not have the desire, nor the will, to police themselves, it is hardly a surprise that Government intervention is being considered as an alternative. I think residential-broadband ISPs need to follow the lead of [e.g. Qwest, Comcast, etc.], which are making a legitimate attempt to identify, notify, and mitigate abusive/botnetted customers. Also, the U.S. leads the rest of the world in hosting providers which are hosting Eastern European criminal malfeasance -- this is a fact. In other words, as things stand now, U.S. providers kind of deserve whatever the U.S. Government dishes out, since they have show that they do not have a willingness to police their own backyards. It is really sad, actually. - - ferg -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.5.3 (Build 5003) wj8DBQFMDuv6q1pz9mNUZTMRAjVqAJ480dH3CSSGYp9LOjlXwFNm+egdiQCfYcKJ I0tMJo4UuD7OrFiF8H6L/cA= =+5X/ -----END PGP SIGNATURE----- -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawgster(at)gmail.com ferg's tech blog: http://fergdawg.blogspot.com/