this post was submitted on 05 Nov 2023
-25 points (26.4% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54565 readers
456 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

This is an continuation of my last post, specifically a comment from @[email protected]:

It will never get recommended. It’s bad for the network and bad for your privacy.

Excluding that doing so is bad for the network, why it is "private" using VPN but not Tor, inferring from common consensus. The main point in the blog post is a protocol level problem:

apparently in some cases uTorrent, BitSpirit, and libTorrent simply write your IP address directly into the information they send to the tracker and/or to other peers

Tor and VPN are both transports what wrap other traffic within. If that statement is true, no transport can save the information leaking nature of the BT protocol itself.

all 11 comments
sorted by: hot top controversial new old
[–] [email protected] 22 points 1 year ago* (last edited 1 year ago) (1 children)

Both work quite differently. TOR routes you over several layers, obscures your IP and changes the IPs around occasionally so you can't be tracked.

With Bittorrent you want lasting connections to other peers to be able to receive and send all the data. This doesn't align with the ever changing IPs and stuff.

A VPN gives you one IP that you can have for hours.

A VPN supports UDP connections, TOR doesn't.

Connecting your Bittorrent client to the Socks-Proxy of a TOR client is a different setup than it just sending normal packets through a VPN tunnel.

TOR is slow (by design), a VPN is fast.

If your client or something leaks your IP it happens anyways, if you route it over one node or seven. All the extra energy is just wasted.

And bittorrent puts even more strain on the TOR network the way it works. Making it slower for anybody else. And (ab)using the resources volunteers provide. (And which are meant for better use-cases.)

[–] [email protected] 9 points 1 year ago (1 children)

apparently in some cases uTorrent, BitSpirit, and libTorrent simply write your IP address directly into the information they send to the tracker and/or to other peers

These are just bad practices by shady bittorrent programs. Choose a good client and you'll avoid those issues.

The reason why is that Tor doesn't support UDP and it's just harmful for the network to do bittorrent over it.

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago)

It's probably more they either optimize for speed or for privacy. You sometimes can't do both. Including IPs is usually done to find the best and direct connection between peers. It's not shady per se. But it'll harm you if it's the default.

[–] [email protected] 8 points 1 year ago (1 children)

It's not bad for privacy, is bad for TOR

[–] [email protected] 2 points 1 year ago

And privacy because no crowd to blend in with.

[–] [email protected] 3 points 1 year ago (1 children)

Tor routes through relays, which could be run by digital rights holders or government entities. Presumably they could trace with some effort. VPN is an encrypted connection to some trusted party who is accepting your money. Some VPN providers have policies about keeping no logs of your network traffic. Presumably the VPN provider needs good lawyers to know they can safely discard and ignore all the copyright notices. If the VPN provider did keep logs, and if they were legally compromised in some way, the VPN would no longer be protective.

[–] [email protected] 4 points 1 year ago* (last edited 1 year ago)

The relays don't have access to the content, it's encrypted. But the exit-nodes can see what you're transmitting. They just don't know who you are because they got your data forwarded by the relays.