Strange reports are being heard from P2P users of the now famous "Comcast" customer interdiction method that may now be in use by Cox.
http://www.dslreports.com/shownews/Cox-Also-Disrupting-P2P-Traffic-89481Cox users in our forums have been complaining about peer to peer performance being less than optimal. In particular, they've been noting that their upstream p2p throughput has been "weak and random," though so far this has only been showing up in certain markets. We asked regular user Robb Topolski, who was the first to discover Comcast's traffic shaping practices, to take a look at Cox connectivity a little more closely.
According to Topolski, Cox is in fact using traffic shaping to degrade p2p traffic. In analyzing a user log, he has concluded that Cox is using traffic shaping hardware to send forged TCP/IP packets with the RST (reset) flag set -- with the goal of disrupting eDonkey traffic. He's been unable to tell precisely what hardware Cox is using, but he notes that the technique being used is very similar to Comcast's treatment of BitTorrent.
If more evidence shows that Cox are indeed corupting their users traffic flow its likely to launch another round of potential class action suits and perhaps more as this activity would clearly be part a fraud against the customers in terms of false advertising claims and deceptive practices, my view is fraudsters who practice this kind of stealth attacks on their users traffic are clearly intercepting their customers private data and reading a portion of it to decide when to disrupt and this action alone moves them outside of the safe harbour of "carrier carrier" status, the law is clear regarding the destruction of data and illegal interception of private data, lets hope they get hung out to dry.