Comcast rolls out brand new bandwidth throttles

Faces new suits for bagging BitTorrents


Update: This story originally quoted from a piece from The New York Times. But The Times has largely rewritten its story, and after several calls, Comcast has responded to our requests for comment, so we have removed all quotes from The Times.

Comcast is testing a brand new means of throttling traffic on its cable-based internet service.

Today, The New York Times reports, America's second largest ISP rolls out these tests in Chambersburg, Pennsylvania and Warrenton, Virginia. Users who exceed an unspecified bandwidth threshold will have their connections slowed by an unspecified amount for an unspecified period of time.

For at least a year - and maybe more - Comcast has used TCP reset flags to throttle BitTorrent and other peer-to-peer traffic, claiming that P2P file sharing causes severe congestion on its network. But after some heat from the US Federal Communications Commission, the company says it will drop the practice by the end of the year, adopting a means of controlling network congestion that's protocol agnostic.

And it looks like it has settled on a general method.

The tests in Pennsylvania and Virginia will be followed by a third in Colorado Springs, Colorado later this summer. In each market, Comcast will use a different breed of hardware - and a different set of rules - to control congestion. The company will then determine which setup makes the most sense for a nationwide roll-out.

What hardware is the company testing? What rules? Comcast won't say. But company spokesman Charlie Douglas did say this: "We're looking at three hardware-software solutions. And we're trying to figure out which one delivers the best overall customer experience."

Which begs the question: How can you determine the best customer experience if customers don't know what they're getting? If you're a Comcast subscriber in Chambersburg, Warrenton, or Colorado Springs, you have no way of knowing when your connection might slow, how long it will slow, or how slow it will get.

Douglas also said only "a very, very small number of people would be impacted." That would be people be "who are engaged in disproportionate bandwidth usage as a result of, for example, sustained and continuous downloading." And he points out that the throttling will only occur during "periods of network congestion."

These are tests, so we'll cut the company some slack. We would hope that when this does officially roll out, Comcast tells the world everything. After all, the chief problem with the company's BitTorrent throttling is that customers weren't told what was going on. Even in the face of an FCC investigation, Comcast refuses to tell all.

And that's the subject of three new lawsuits against the company. Today, a Washington, D.C. law firm announced a trio of state-based suits that accuse the big-name ISP of "deceiving and misleading" consumers.

"Comcast has essentially not given consumers what they paid for," says August J. Matteis, Jr., a partner with Gilbert Randolph LLP. "They didn't disclose and they lied about what they were selling to consumers. They were throttling [P2P traffic] and they didn't tell people about it and they covered up that they were doing it."

The suits - filed in California, Illinois, and New Jersey - follow a similar suit the firm filed in D.C. back in February. All four are based on state consumer protection laws. Another Commcast-BitTorrent suit is pending in federal court. ®

Similar topics


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021