Comment Tough to implement (Score 1) 664
As spooky as "deep packet inspection" might sound, there's not much that can be done if all of the traffic is encrypted since there would be no way to differentiate between email, P2P, and normal web surfing. Yet another reason to start using Tor... aside from the whole wiretapping mess.