FINDING · POLICY
The U.S. 'five strikes' program had major ISPs reduce bandwidth of accused subscribers; challenging required a $35 fee with only one permitted defense category ('unauthorized use of account'). Users responded by routing traffic through VPNs and anonymizing networks such as I2P to bypass ISP-level monitoring entirely.
From 2011-seltzer-infrastructures — Infrastructures of Censorship and Lessons from Copyright Resistance · §1.4.2 · 2011 · Free and Open Communications on the Internet
Implications
- When ISPs are recruited as enforcement proxies, traffic must be tunneled through providers outside the enforcement network; VPN and mix-network onboarding is the direct and necessary user response.
- Design for the ISP as adversary: assume any plaintext flow-level metadata (source/destination IP, timing) visible to the access network can and will be acted upon.
Tags
Extracted by claude-sonnet-4-6 — review before relying.