When Comcast was found to be interfering with BitTorrent traffic, what method was being used?
a.
Comcast was creating access lists that blocked known BitTorrent trackers.
b.
Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users.
c.
Comcast was interjecting TCP segments with the RST (reset) field set.
d.
Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.