Violation Type:Transparent Proxying

From Violations Tracker
Jump to: navigation, search
Violation Type

Transparent Proxying

An ISP uses a transparent proxy to cache HTTP requests.

This involves intercepting Layer 4 TCP traffic on port 80 and rerouting it through a transparent HTTP proxy operated by the ISP.

This involves processing layer 4 data (which is beyond the remit of an ISP); intercepting communications and impersonating the remote party.

This is a violation of network neutrality and thus constitutes a violation.

Implies NLREMIT.