As I read the comments, it looks like people are missing a bet on what the practice that the cariers are doing can provide.
People are noting that techincally competent people can easily bypass the restrictions, and others are noting that the vast majority of the public is not sufficiently technically competent to work around it.
I'm reminded a bit of the drug dealer situation in most places. It's trivially easy for most people to find a supplier for nearly any drug that someone has an interest in getting. Most people don't go looking for them for whatever reason, but it's not because they don't know where to go, or at least if they thought about it a bit they could figure it out. The same is likely to be true of media content.
So, user George doesn't know how to get around these filters, but it's likely that one of George's friends does, or one of George's friends knows someone who can. If this ever became a significant issue, I suspect that people would set up secure chat servers (or even a https based site) where they let their neighbors know they can request whatever movie they are interested in, and through a bot on the server they get back a link to the file already downloaded, or to the file being downloaded, and they can start watching. The link may be to a torrent proxy that goes and gets the bits of the files from other people offering the same sort of a service, and none of the people providing this service actually have copies of the files maintained on their systems either. (Yes, that somewhat defeats the purpose of a torrent, but the idea is to provide a service to end users, not necessarily be a good torrent netizen.) To reduce the likelyhood that the person providing the service is adversly affected, he or she may require that the 'customer' run a torrent proxy on their system that the load of torrent traffic gets distributed across. Better operators will do something like build their software package to prevent spam bots from running on the customer's computers. That may even be all that the customer is asking for from the service provider, and the torrent operation may be going on completely transparently to them.
I know, that seems complex. But from an end user perspective for the movies, it looks like I log into a secure web server, identify the movie I want to watch, and get a link to that movie. I click on that link, and I start watching the movie. Perhaps George texts or IMs a movie title to Bill, who texts back a URL that George then enters in their web browser, or even follows right on their phone or pc.
In time a network of providers of the service will exist, or several networks. It might be done through something like IRC, and the various providers will check to see who's closest to the end user and get a link close to them.