How can BitTorrent traffic be anonymized with Tor?
tor.stackexchange.com
external-link
This blog post from a few years ago suggests that using BitTorrent services over Tor is a bad idea for multiple reasons. However, it also suggests some fixes to get over these problems. Is using a
  1. It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address.
  2. Tor is a TCP only network.
  3. While this doesn’t give you the anonymity you wanted, it will hurt the network for other users.
@joel1974@lemmy.world
link
fedilink
English
211Y

deleted by creator

Tor is a TCP only network.
Can someone ELI5 this point for me? I know there is TCP and UDP, is UDP safer then ?

@Zatore@lemm.ee
link
fedilink
English
53
edit-2
1Y

TCP is a protocol where all the data is verified when sent. There is extra back and forth communication along with the payload to check that the payload arrived safely. Its great for downloading files when you want to make sure nothing is missing or damaged. UDP is more like a constant data stream where the sender doesn’t care if it all gets to you. The advantage is that you send less data overall, useful if you don’t care if one frame of a video stream looks weird.

One protocol isn’t safer than another, its all about how much bandwidth you have/need. Torrenting over TOR uses up way more bandwidth than needed. Depending on the implementation, TCP can use 50% more bandwidth.

thank you sir!

and sometimes we do care about successful delivery but need to handle that ourselves so we use UDP to avoid layering delivery verification mechanisms.

https://openvpn.net/faq/what-is-tcp-meltdown

@PraiseTheSoup@lemm.ee
link
fedilink
English
41Y

and sometimes we do care about successful delivery but need to handle that ourselves

Am I right to assume this is generally carried out by the users’ torrent client which is why we prefer UDP for torrenting?

Natanael
link
fedilink
English
11Y

Torrents are literally built around file hashes so yes

@emptiestplace@lemmy.ml
link
fedilink
English
11Y

I’m definitely not an expert on Bittorrent, but I believe the person above was incorrect - I think there are some extensions to the protocol that enable UDP transport, but typically Bittorrent traffic occurs primarily via TCP.

What you said makes perfect sense in that hypothetical context, though!

Just different. Torrent protocol UTP is based on UDP, it has some advantages, you couldn’t get with Tor

@jack@monero.town
link
fedilink
English
241Y

Torrent via I2P instead

YⓄ乙
link
fedilink
English
12
edit-2
1Y

What’s i2p? I downloaded i2p from fdroid and installed it. It showing peers and active peers but my IP is still the same. Can you please ELI5 ? Thanks

@jack@monero.town
link
fedilink
English
44
edit-2
1Y

I2P is a truly anonymous darknet where every user is a node in the network, unlike TOR where everyone is leeching off of the 6000 nodes. I2P also works great for torrenting. I2P is only for accessing I2P sites and not for anonymous clearnet browsing.

I have never tried the mobile version, but here’s some info for desktop:

There is a java version simply called “I2P” and there is a C++ one called “I2Pd”. Start with the java one, it’s easier and has built-in torrent webclient.

Install I2P from geti2p.net and start it. You are now a node/router in the network. To access I2P darknet websites like http://planet.i2p you have to tell your browser to use I2P proxy. You should use a different browser profile for using I2P, on firefox you can create one at about:profiles .

Enable I2P on firefox: Settings -> General -> Network Settings. Set manual http and https proxy to 127.0.0.1 port 4444 . You should now be able to visit eepsites (sites ending with .i2p). Always put http:// manually at the beginning. If it tells you to use jump services because it can’t find the site, just click on one of the suggestions.

Torrents are on http://tracker2.postman.i2p . Find one, copy the magnet link and go to the torrent webclient: 127.0.0.1:7657/i2psnark . Add the torrent there. Done, you are now anonymously torrenting.

Isn’t it dangerous to have every client also be a node? Sure, my torrents would come out someone else’s node, but someone else’s torrent could easily come out mine.

I don’t think my ISP cares whether it was actually me who used my IP to get a piracy complaint?

Or maybe I just don’t understand how it works?

Melmi
link
fedilink
English
12
edit-2
1Y

Unlike Tor, which is built around accessing the clearnet anonymously, I2P is primarily designed around keeping traffic in the darknet. When you join I2P, you route traffic for other nodes but only within the I2P network, it will never leave through your clearnet address.

The equivalent of Tor’s exit nodes are called “outproxies”, but they aren’t often used, there aren’t very many of them, and you have to specifically set them up manually as it isn’t the default behavior like it is for Tor.

Thanks!

YⓄ乙
link
fedilink
English
31Y

Thanks. I really appreciate it.

@scarilog@lemmy.world
link
fedilink
English
71Y

Can you explain how the anonymity works?

@jack@monero.town
link
fedilink
English
51Y

On a high level, I2P is an overlay internet on top of the regular web. Everyone has a router address that acts like a regular IP address, except that this one is purely inside the I2P software. So unlike IP addresses that go over your ISP to connect to the internet, on the I2P network your router can connect to other routers directly without the concept of ISP.

Your traffic makes multiple unidirectional hops over nodes in the network before it accesses the site/peer you want to connect with. Connection from your peer back to you goes back over another set of unidirectional nodes (unlike TOR where contacting and receiving uses the same set of nodes). The connection between the nodes uses the latest encryption methods of course.

For more details you would have to ask someone else.

Natanael
link
fedilink
English
31Y

I2P doesn’t behave like Tor by default, it’s designed around connecting to internal peers within its network so your browser won’t treat it as a proxy but default and you have to specifically configure it to route traffic to the I2P network

Fleppensteyn
link
fedilink
English
101Y

That’s what Tribler is for

Tribler is the only thing I found to bypass my network torrent block for free (no vpn).

Just found out about i2p, i2psnark worked with i2p torrent (I couldn’t make qbitorrent work). If I understood corectly, it should work with non i2p torrent if someone on the i2p network has it, but it’s still pretty niche so right now it doesn’t work mist of the time.

@Cl1nk@sh.itjust.works
link
fedilink
English
1
edit-2
1Y

I haven’t used tribler in years, how does it compare to downloading regular public torrent sites? (like the defunct rargb)

Fleppensteyn
link
fedilink
English
11Y

Often it’s not that great, but I believe it just needs more users to solve this

For bittorrent and p2p it is better to use i2p, tor only to surf the internet.

@atlasraven31@lemm.ee
link
fedilink
English
541Y

Mind giving a little info about i2p for the clueless?

@ReversalHatchery@beehaw.org
link
fedilink
English
22
edit-2
1Y

It is a different anonymity network, which works differently in many aspects.

I2P and Tor comparison: https://geti2p.net/en/comparison/tor
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): https://geti2p.net/en/docs/applications/bittorrent

Currently BiglyBt supports I2P and it has been that way for quite some time.
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.

Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.

Near as I can tell:

Tor is about privacy (and is prone to being compromised but…). So long as the exit nodes are in “friendly” countries and are run by trustworthy individuals (…), you are “safe”. And that is why it is popular among journalists. The downside being that a lot of heinous shit is done on Tor and those exit nodes are potentially liable for them.

I2P is about avoiding censorship. Everyone is an exit node and cops kicking down doors doesn’t significantly hurt the network.

But… I would very much NOT use that for torrenting. Because the endpoints can still be detected and recorded. And “I wasn’t downloading that Tay Swizzle concert, I was just letting potentially thousands of other people use my computer to download it… Why did you suddenly start laughing and talking about The Pirate Bay?”.

And that also ignores the “darker” parts of the dark web. Where, rather than getting a letter from the MPAA you get a visit from Chris Hansen.

On i2p everyone is a node but not everyone is an outproxy to the clearnet, you have to enable it manually.

I2P doesn’t really have exit nodes. You can only browse within the I2P network.

@ninchuka@lemmy.one
link
fedilink
English
11Y

Out proxies are a thing

It is not true that every node is an exit node in I2P. The I2P protocol does not officially have exit nodes—all I2P communication terminates at some node within the I2P network, encrypted end-to-end. It is possible to run a local proxy server and make it accessible to other users as an I2P service, creating an “exit node” of sorts, but this is something that must be set up deliberately; it’s not the default or recommended configuration. Users would need to select a specific I2P proxy service (exit node) to forward non-I2P traffic through and configure their browser (or other network-based programs) to use it.

Maybe I am missing something but that just feels like you are arguing semantics.

Traffic exits the sub-WAN from basically any of the computers/nodes in it. So it might not be a Tor Exit Node ™ but it still has all the dangers of it.

@nybble41@programming.dev
link
fedilink
English
8
edit-2
1Y

No, that’s not how I2P works.

First, let’s start with the basics. An exit node is a node which interfaces between the encrypted network (I2P or Tor) and the regular Internet. A user attempting to access a regular Internet site over I2P or Tor would route their traffic through the encrypted network to an exit node, which then sends the request over the Internet without the I2P/Tor encryption. Responses follow the reverse path back to the user. Nodes which only establish encrypted connections to other I2P or Tor nodes, including ones used for internal (onion) routing, are not exit nodes.

Both I2P and Tor support the creation of services hosted directly through the encrypted network. In Tor these are referred to as onion services and are accessed through *.onion hostnames. In I2P these internal services (*.i2p or *.b32) are the only kind of service the protocol directly supports—though you can configure a specific I2P service linked to a HTTP/HTTPS proxy to handle non-I2P URLs in the client configuration. There are only a few such proxy services as this is not how I2P is primarily intended to be used.

Tor, by contrast, has built-in support for exit nodes. Routing traffic anonymously from Tor users to the Internet is the original model for the Tor network; onion services were added later. There is no need to choose an exit node in Tor—the system maintains a list and picks one automatically. Becoming a Tor exit node is a simple matter of enabling an option in the settings, whereas in I2P you would need to manually configure a proxy server, inform others about it, and have them adjust their proxy configuration to use it.

If you set up an I2P node and do not go out of your way to expose a HTTP/HTTPS proxy as an I2P service then no traffic from the I2P network can be routed to non-I2P destinations via your node. This is equivalent to running a Tor internal, non-exit node, possibly hosting one or more onion services.

Fair enough. Then you have the exact same risks as far as torrenting (the point of this thread) are confirmed. But still increased risks as far as csam.

I2P is a P2P darknet. on tor the network is run by volenteers (~6000 nodes) while on I2P everyone on the nerwork is a node, and their are no built in exit nodes (in i2p their called outproxies). the official I2P router has a built in torrent client as well. like torrents the more people on i2p the faster the network, while the opposite is true for tor.

@CAVOK@lemmy.world
link
fedilink
English
151Y

There’s an i2p community here on lemmy. Click my username for a link.

@alvvayson@lemmy.world
link
fedilink
English
321Y

Indeed.

Torrenting over I2P is the future. No need for VPN and no dependency on donated bandwidth like with Tor.

The technology needs a bit of refinement and it seems they are struggling to attract and maintain good developers.

In my opinion, the fundamental protocols of I2P need a revamp to make torrenting faster and more efficient.

It will take a few years before we solve these problems.

@Staccato@lemmy.world
link
fedilink
English
61Y

I2P is still around? I remember experimenting with it a decade ago. Sounds like it’s still a slow experience.

@ninchuka@lemmy.one
link
fedilink
English
11Y

It’s not super fast but it’s more then usable, you just need to get lucky with fast routers in your tunnels

@Moxible@monyet.cc
link
fedilink
English
271Y

is it okay if I download a .torrent file from private trackers through TOR browser?

Yes, but make sure to use a VPN or a Seedbox for the actual torrenting

Not always needed with private trackers.

Free Palestine 🇵🇸
link
fedilink
English
21Y

I’d err on the side of caution. I always use a VPN for privacy reasons, my ISP doesn’t need to know what websites I’m visiting and which P2P protocols I use. Also, there’s no need to expose my approximate geographical location to every service I connect to.

Fine for Tor. But check the rules first so you don’t get banned for duplicate IP.

@Thrift3499@lemm.ee
link
fedilink
English
241Y

I wouldn’t bother tbh. As soon as you start using it in your torrent client other users can see your IP address anyway.

Seedboxes are a pretty good solution.

@lemmyingly@lemm.ee
link
fedilink
English
31Y

Unless you use a VPN or proxy.

Seedboxes are good but only seem worth the cost if you’re utilizing it a lot/frequently?

@Thrift3499@lemm.ee
link
fedilink
English
2
edit-2
1Y

The cost is reasonable, you can get 1tb of storage for around £10 a month. Most Seedboxes will let you install VPN servers on them as well, I’m not sure what you pay for specific VPN software nowadays. So you could theoretically replace Netflix, Amazon Prime, Hulu etc and have a VPN.

They’re basically required for building ratio on private trackers nowadays.

@ipkpjersi@lemmy.ml
link
fedilink
English
61Y

Use a seedbox IMO although with private trackers you’re generally pretty safe.

deleted by creator

Being unstoppable

@CmdrShepard@lemmy.one
link
fedilink
English
11Y

File sharing

Syl ⏚
link
fedilink
English
31Y

Any plan on doing torrent over veilid?

@onlinepersona@programming.dev
creator
link
fedilink
English
41Y

How does veilid compare to I2P?

Syl ⏚
link
fedilink
English
21Y

It seems like a mix between tor and i2p.

Did I2P take off enough for one to use it?

@onlinepersona@programming.dev
creator
link
fedilink
English
111Y

Depends. It’s definitely smaller than TOR because people don’t know of it. It’s slower, but if you don’t need things on demand, have a seedbox or some way to torrent 24/7, things are quite acceptable.

@neutron@thelemmy.club
link
fedilink
English
101Y

It would be great if big trackers started encouraging use of I2P as an alternative.

@nhu@programming.dev
link
fedilink
English
17
edit-2
1Y

Edit: I misread the statement. Thanks for pointing this out to all the repliers! My fault.

The first point of the answer is misleading. Tor is indeed designed with anonymity in mind. The leaks occur in different layers, like the for e.g. chosen BitTorrent client.

https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea/

Don’t worry, I misread it the exact same way

@onlinepersona@programming.dev
creator
link
fedilink
English
121Y

Torrenting over TOR doesn’t make you anonymous. How is that misleading?

prole
link
fedilink
English
61Y

That’s kind of what they said though?

@VerPoilu@sopuli.xyz
link
fedilink
English
451Y

He said torrent, not tor.

space_comrade [he/him]
link
fedilink
English
191Y

The torrent protocol wasn’t designed with anonymity in mind, not Tor.

@JCPhoenix@beehaw.org
link
fedilink
English
301Y

I didn’t think people torrented over TOR. Aside from the security issues (which I didn’t know about in the first place), I would think it’s gotta be insanely slow. Is it not?

@onlinepersona@programming.dev
creator
link
fedilink
English
271Y

I keeps getting brought up because TOR is the most popular anonymizing network. It’s not far-fetched to think “how can I make myself anonymous while torrenting?” search for “how to be anonymous online”, find TOR and put two and two together. It happens all the time, which is why the blog post by TOR was made about it.

@JCPhoenix@beehaw.org
link
fedilink
English
5
edit-2
1Y

Gotcha, yeah that checks out. I guess I never made that connection, even though I use TOR and torrent here and there. Probably also because I’m more concerned about download speeds over privacy when torrenting. And regular web traffic over TOR is often insanely slow compared to the clearnet.

Ever since getting a copyright strike several years ago, I’ve switched to using a commercial VPN while torrenting. I don’t know if that’s the all-in-one solution for hiding from my ISP, but it seems to work. But I also rarely torrent these days, too, so not as many opportunities for them to catch me, I suppose.

@littlecolt@lemm.ee
link
fedilink
English
391Y

I pay monthly for access to a SOCKS5 proxy service from a company called BTGuard, and tell my BT client to connect through that. It is not expensive and works great I’ve been using it for about 12 or 13 years, and found it after getting an email from my ISP saying they identified me downloading TV shows. In that time, I have only had issues a handful of times. More reliable than most other services I pay for and I’ve never seen another DMCA notice since.

BTGuard

Expensive VPN with less features. Probably made sense 12 or 13 years ago.

@littlecolt@lemm.ee
link
fedilink
English
1
edit-2
1Y

I do not use their VPN, just the socks5 proxy, so I can’t comment. It’s $6.95 USD monthly. Costs less than a meal out. Do you have an alternative that is less expensive with no catches or limits? I’m all ears. Serious. I’m always willing to try other stuff. Any socks5 proxy service that costs less.

I just don’t get calling it expensive. It’s not really.

Most providers have long-term plans for less - like $3/month for 2-3 years. That’s still the cost of eating a few meals out. Some of them even have port forwarding. Why spend double the money for less features?

@Jiggs@lemm.ee
link
fedilink
English
21Y

Mullvad costs $5 and Im not aware of any catches Would be glad if others pointed out if there are any Actual VPN, socks5 proxy available

Mullvad doesn’t support port forwarding.

SOCKS5 proxies don’t.

@littlecolt@lemm.ee
link
fedilink
English
110M

Correct. I’m a leech. I use a private tracker and whenever I need ratio, I pay for a month of seedbox on feralhosting and grab popular torrents for a month. I have a ton of surplus ratio.

@PhlubbaDubba@lemm.ee
link
fedilink
English
-81Y

Tor was also built by the Navy right? I’m pretty sure they wouldn’t make it easy to get away with breaking the law over that

@Vub@lemmy.world
link
fedilink
English
51Y

You misunderstand, this is not the issue here. It is just not made for torrents and they hurt/break the network.

Specifically, it overloads the network. A single VPN server used for torrenting (proton, air, nord, etc) deals more traffic than the whole Tor network.

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
!piracy@lemmy.dbzer0.com
Create a post
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don’t request invites, trade, sell, or self-promote

3. Don’t request or link to specific pirated titles, including DMs

4. Don’t submit low-quality posts, be entitled, or harass others


Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


  • 1 user online
  • 219 users / day
  • 509 users / week
  • 927 users / month
  • 4.94K users / 6 months
  • 1 subscriber
  • 3.2K Posts
  • 78.4K Comments
  • Modlog