|reply to WernerSchutz |
Re: How are disputes resolved?
said by WernerSchutz:I am very interested in the latter. Having been active on IRC for 16 years, and having played a variety of online games (although I don't play much anymore), I know how easy it is, and I have actually had this happen to my, to use some big university network, especially outside of the United States to blast someone's IP address with a LOT of data.
Looking at the tech discussions presented by JLivingood, I believe the meter is quite accurate, although being targeted by a DDOS/virus/malware would create a problem for you, since technically the data transfer would be accurate, although not intended by the customer.
Now, on my side I may actually not even notice it, besides that the internet just got a little slower..... I have a decent router that blocks ICMP, and any type of that traffic will just be dropped, same with bogus HTTP replies and whatnot.
But on a 15 Mbps connection, you can probably generate 50, 60 GB of traffic in a 24 hour period, and if you have someone that is pissed off enough at you because YOU are the one that WON THE GAME the other night, and you just HAD to gloat..... that can add up rather quickly.
Also, there are still SO MANY people that have open routers. In my street there are 10 routers I can see when I sit out on my front porch, and 4 of them are open, 3 of them are WEP and cracked in minutes, with the remaining 3 being WPA, including my own.
Now we all know that we are responsible for our own data, but it is NOT ILLEGAL to have an open router, and many people do not even KNOW any better!
Also, WEP is easily cracked and if you THINK you are safe.... someone might actually be using your internet. And I say that because someone in an apartment building I know has used his Linux laptop to crack 2 of the WEP routers he can see, and is using their internet because he himself GOT SHUTDOWN for not paying his bills.
Say you come home after a long weekend, check you meter, and all over sudden 80 GB was added that you did not initiate.... and your poor WEP router doesn't log who did what at what time.
Alternatively, how do you prevent cheaters? Someone that DOES leave his torrent client running all the time, and leaves his router open ON PURPOSE so that when he crosses the line, he can simply claim..... IT WASN'T ME!!
How does this work?
"I reject your reality and substitute my own!"