604
PSA: Don't torrent over TOR (tor.stackexchange.com)
submitted 8 months ago by [email protected] to c/[email protected]
  1. It doesn't make you anonymous. Torrent protocol wasn't designed with anonymity in mind and there are a million ways you're going to leak your actual IP address.
  2. Tor is a TCP only network.
  3. While this doesn't give you the anonymity you wanted, it will hurt the network for other users.
top 50 comments
sorted by: hot top controversial new old
[-] [email protected] 104 points 8 months ago

For bittorrent and p2p it is better to use i2p, tor only to surf the internet.

[-] [email protected] 54 points 8 months ago

Mind giving a little info about i2p for the clueless?

[-] [email protected] 86 points 8 months ago

I2P is a P2P darknet. on tor the network is run by volenteers (~6000 nodes) while on I2P everyone on the nerwork is a node, and their are no built in exit nodes (in i2p their called outproxies). the official I2P router has a built in torrent client as well. like torrents the more people on i2p the faster the network, while the opposite is true for tor.

[-] [email protected] 15 points 8 months ago

There's an i2p community here on lemmy. Click my username for a link.

[-] [email protected] 32 points 8 months ago

Indeed.

Torrenting over I2P is the future. No need for VPN and no dependency on donated bandwidth like with Tor.

The technology needs a bit of refinement and it seems they are struggling to attract and maintain good developers.

In my opinion, the fundamental protocols of I2P need a revamp to make torrenting faster and more efficient.

It will take a few years before we solve these problems.

[-] [email protected] 6 points 8 months ago

I2P is still around? I remember experimenting with it a decade ago. Sounds like it's still a slow experience.

load more comments (1 replies)
[-] [email protected] 36 points 8 months ago

I pay monthly for access to a SOCKS5 proxy service from a company called BTGuard, and tell my BT client to connect through that. It is not expensive and works great I've been using it for about 12 or 13 years, and found it after getting an email from my ISP saying they identified me downloading TV shows. In that time, I have only had issues a handful of times. More reliable than most other services I pay for and I've never seen another DMCA notice since.

load more comments (7 replies)
[-] [email protected] 26 points 8 months ago
[-] [email protected] 26 points 8 months ago

is it okay if I download a .torrent file from private trackers through TOR browser?

[-] [email protected] 23 points 8 months ago

I wouldn't bother tbh. As soon as you start using it in your torrent client other users can see your IP address anyway.

Seedboxes are a pretty good solution.

[-] [email protected] 3 points 8 months ago

Unless you use a VPN or proxy.

Seedboxes are good but only seem worth the cost if you're utilizing it a lot/frequently?

load more comments (1 replies)
[-] netchami 18 points 8 months ago

Yes, but make sure to use a VPN or a Seedbox for the actual torrenting

load more comments (2 replies)
[-] [email protected] 6 points 8 months ago

Use a seedbox IMO although with private trackers you're generally pretty safe.

load more comments (1 replies)
[-] [email protected] 25 points 8 months ago

Did I2P take off enough for one to use it?

[-] [email protected] 11 points 8 months ago

Depends. It's definitely smaller than TOR because people don't know of it. It's slower, but if you don't need things on demand, have a seedbox or some way to torrent 24/7, things are quite acceptable.

[-] [email protected] 10 points 8 months ago

It would be great if big trackers started encouraging use of I2P as an alternative.

[-] [email protected] 25 points 8 months ago
[-] [email protected] 12 points 8 months ago* (last edited 8 months ago)

What's i2p? I downloaded i2p from fdroid and installed it. It showing peers and active peers but my IP is still the same. Can you please ELI5 ? Thanks

[-] [email protected] 44 points 8 months ago* (last edited 8 months ago)

I2P is a truly anonymous darknet where every user is a node in the network, unlike TOR where everyone is leeching off of the 6000 nodes. I2P also works great for torrenting. I2P is only for accessing I2P sites and not for anonymous clearnet browsing.

I have never tried the mobile version, but here's some info for desktop:

There is a java version simply called "I2P" and there is a C++ one called "I2Pd". Start with the java one, it's easier and has built-in torrent webclient.

Install I2P from geti2p.net and start it. You are now a node/router in the network. To access I2P darknet websites like http://planet.i2p you have to tell your browser to use I2P proxy. You should use a different browser profile for using I2P, on firefox you can create one at about:profiles .

Enable I2P on firefox: Settings -> General -> Network Settings. Set manual http and https proxy to 127.0.0.1 port 4444 . You should now be able to visit eepsites (sites ending with .i2p). Always put http:// manually at the beginning. If it tells you to use jump services because it can't find the site, just click on one of the suggestions.

Torrents are on http://tracker2.postman.i2p . Find one, copy the magnet link and go to the torrent webclient: 127.0.0.1:7657/i2psnark . Add the torrent there. Done, you are now anonymously torrenting.

[-] beastlykings 9 points 8 months ago

Isn't it dangerous to have every client also be a node? Sure, my torrents would come out someone else's node, but someone else's torrent could easily come out mine.

I don't think my ISP cares whether it was actually me who used my IP to get a piracy complaint?

Or maybe I just don't understand how it works?

[-] [email protected] 12 points 8 months ago* (last edited 8 months ago)

Unlike Tor, which is built around accessing the clearnet anonymously, I2P is primarily designed around keeping traffic in the darknet. When you join I2P, you route traffic for other nodes but only within the I2P network, it will never leave through your clearnet address.

The equivalent of Tor's exit nodes are called "outproxies", but they aren't often used, there aren't very many of them, and you have to specifically set them up manually as it isn't the default behavior like it is for Tor.

[-] beastlykings 2 points 8 months ago
[-] [email protected] 7 points 8 months ago

Can you explain how the anonymity works?

[-] [email protected] 5 points 8 months ago

On a high level, I2P is an overlay internet on top of the regular web. Everyone has a router address that acts like a regular IP address, except that this one is purely inside the I2P software. So unlike IP addresses that go over your ISP to connect to the internet, on the I2P network your router can connect to other routers directly without the concept of ISP.

Your traffic makes multiple unidirectional hops over nodes in the network before it accesses the site/peer you want to connect with. Connection from your peer back to you goes back over another set of unidirectional nodes (unlike TOR where contacting and receiving uses the same set of nodes). The connection between the nodes uses the latest encryption methods of course.

For more details you would have to ask someone else.

[-] [email protected] 3 points 8 months ago

Thanks. I really appreciate it.

[-] [email protected] 3 points 8 months ago

I2P doesn't behave like Tor by default, it's designed around connecting to internal peers within its network so your browser won't treat it as a proxy but default and you have to specifically configure it to route traffic to the I2P network

[-] [email protected] 23 points 8 months ago

I torrent without any protection or vpn, its legal here

[-] [email protected] 16 points 8 months ago

That's great for you and the community, as you aren't torrenting over TOR 👍

[-] [email protected] 2 points 8 months ago

Does TOR have some utility for the average tech people? Just curious I havent used it.

[-] [email protected] 4 points 8 months ago

Same here. Whilst torrent sites themselves are blocked, once you get the magnet link/torrent via a proxy/VPN, there is no issue. I do not think anyone has ever received a cease and desist letter from their ISPs here. But then, I think, this is the case for many countries outside of the developed world.

[-] [email protected] 19 points 8 months ago

Tor is a TCP only network.
Can someone ELI5 this point for me? I know there is TCP and UDP, is UDP safer then ?

[-] [email protected] 50 points 8 months ago* (last edited 8 months ago)

TCP is a protocol where all the data is verified when sent. There is extra back and forth communication along with the payload to check that the payload arrived safely. Its great for downloading files when you want to make sure nothing is missing or damaged. UDP is more like a constant data stream where the sender doesn't care if it all gets to you. The advantage is that you send less data overall, useful if you don't care if one frame of a video stream looks weird.

One protocol isn't safer than another, its all about how much bandwidth you have/need. Torrenting over TOR uses up way more bandwidth than needed. Depending on the implementation, TCP can use 50% more bandwidth.

[-] [email protected] 23 points 8 months ago

and sometimes we do care about successful delivery but need to handle that ourselves so we use UDP to avoid layering delivery verification mechanisms.

https://openvpn.net/faq/what-is-tcp-meltdown

[-] [email protected] 3 points 8 months ago

and sometimes we do care about successful delivery but need to handle that ourselves

Am I right to assume this is generally carried out by the users' torrent client which is why we prefer UDP for torrenting?

load more comments (2 replies)
[-] [email protected] 5 points 8 months ago

thank you sir!

load more comments (1 replies)
[-] [email protected] 14 points 8 months ago* (last edited 8 months ago)

Edit: I misread the statement. Thanks for pointing this out to all the repliers! My fault.

The first point of the answer is misleading. Tor is indeed designed with anonymity in mind. The leaks occur in different layers, like the for e.g. chosen BitTorrent client.

https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea/

[-] [email protected] 42 points 8 months ago

He said torrent, not tor.

[-] [email protected] 19 points 8 months ago

The torrent protocol wasn't designed with anonymity in mind, not Tor.

[-] [email protected] 11 points 8 months ago

Torrenting over TOR doesn't make you anonymous. How is that misleading?

load more comments (1 replies)
[-] [email protected] 10 points 8 months ago

That's what Tribler is for

[-] ByGourou 2 points 8 months ago

Tribler is the only thing I found to bypass my network torrent block for free (no vpn).

load more comments (1 replies)
load more comments (2 replies)
[-] [email protected] 3 points 8 months ago

Any plan on doing torrent over veilid?

[-] [email protected] 4 points 8 months ago

How does veilid compare to I2P?

[-] [email protected] 2 points 8 months ago

It seems like a mix between tor and i2p.

load more comments
view more: next ›
this post was submitted on 21 Oct 2023
604 points (97.5% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

52731 readers
593 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


founded 1 year ago
MODERATORS