Jump to content
  • Sign up for free and receive a month's subscription

    You are viewing this page as a guest. That means you are either a member who has not logged in, or you have not yet registered with us. Signing up for an account only takes a minute and it means you will no longer see this annoying box! It will also allow you to get involved with our friendly(ish!) community and take part in the discussions on our forums. And because we're feeling generous, if you sign up for a free account we will give you a month's free trial access to our subscriber only content with no obligation to commit. Register an account and then send a private message to @dave u and he'll hook you up with a subscription.

Torrents - where now


greenoak
 Share

Recommended Posts

So what can happen if someone gets caught using TOR? Not that I'd ever even consider using it

 

Nothing since it is just a network which attempts to provide anonymity online.  However, if you somehow get nabbed buying drugs, hiring an assassin or looking at under-aged girls fannies then it might get a bit trickier.

 

For my shame, as a software developer I do not know that much about the mechanics behind it but from what I know it relays your traffic across many different nodes making it difficult to trace the request.

 

People underestimate social engineering.  It is a skill employed by most hackers and FBI agents.  The TOR network is well known to the feds now so caveat emptor.

Link to comment
Share on other sites

So what can happen if someone gets caught using TOR? Not that I'd ever even consider using it

There's nothing wrong with using TOR. It's what you are routing over it that may get you in trouble. TOR is not a good option for torrenting BTW, it doesn't have high enough bandwidth for moving movies and the like around. At least not until the NSA invest more in the infrastructure (haha!).

Link to comment
Share on other sites

So what can happen if someone gets caught using TOR? Not that I'd ever even consider using it

 

Same as happens if you get caught wearing a backpack. No-one gives a fuck unless it's got naughty things in it, and they only know if they take the unusual step of stopping you to look inside, and for that they would need a court order unlike searching your bag, and it would still be incredibly difficult. As above, TOR isn't good for torrenting, but allegedly some people might find torrents with it. Some other people apparently also use peer blocking services so as not to accidentally share with the wrong sorts.

Link to comment
Share on other sites

Same as happens if you get caught wearing a backpack. No-one gives a fuck unless it's got naughty things in it, and they only know if they take the unusual step of stopping you to look inside, and for that they would need a court order unlike searching your bag, and it would still be incredibly difficult. As above, TOR isn't good for torrenting, but allegedly some people might find torrents with it. Some other people apparently also use peer blocking services so as not to accidentally share with the wrong sorts.

How do you use tor to find torrents?

Link to comment
Share on other sites

How do you use tor to find torrents?

 

Just use a proxy service for finding the torrents, download the torrent file itself then use a torrent client outside of the proxy to download it.

 

There is not really any need to be downloading torrent files under anonymity as far as I am concerned unless you are having to do this because your ISP has blocked them.  There are plenty of bad people in this world and those downloading an episode of Breaking Bad are really not on the radar of those in control.

 

The only thing I would recommend is to encrypt personal data and stuff you might be concerned about on your machine. If you are worried that downloading pirated material will compromise you then put it onto an encrypted virtual drive.  Truecrypt is my favourite http://www.truecrypt.org/

 

It allows you to put in a 'duress' password.  You can save things like your CV or bank statements in 'duress' mode so when the feds come to break your balls and force you to open the file, you enter the 'duress' password and it just shows your bank statements and Cv were in there rather than your hardcore snuff porn.

 

Your really sensitive stuff stays encrypted until you enter the real password.

Link to comment
Share on other sites

Deep packet analysis (or inspection) isn't just about trying to inspect the content of packets, it's also about the behaviour of packets / traffic. The analysis of that CAN and IS used to predict possible or probable usage.

 

You're thinking purely of inspection, and not behavioural analysis. Whic is precisely why I made the point that they can SUSPECT your usage.

Stop moving the goalposts and read what you've posted at the top of page 4, particularly the part I highlighted in my response to that post.

 

This is what you wrote: "Moreover, some ISP's can still detect what you're doing, even if they don't know the precise details - i.e. gaming / torrenting etc. This is done through some clever analysis of the encrypted traffic that give strong clues (deep packet analysis)." That is, to put it bluntly, pure unadulterated bullshit, written by someone who doesn't have a fucking clue.

 

If I deploy VPN which uses decent-enough encryption, nobody can find out what kind of traffic passes through that connection, no matter how much "deep packet analysis (or inspection)" is done, unless I hand over the private keys and certificates used to establish that VPN connection.

 

VPN traffic during browsing is distinctly different than during streaming or gaming. Even if they can't be certain you're streaming, they can still opt to limit your bandwidth (and they do), or mark you for further investigation (even through a VPN).

Please, find out how VPN actually works before spouting more bollocks. Are you on a wind up?

 

If I use VPN to encrypt my traffic (which could be anything), nobody can guess what passes through that encrypted connection, unless I hand over the encryption keys and my ISP has the chance to see/decrypt that traffic.

 

But all this is by the by.... the purpose of the post was to make people aware that simple web proxies and torrent proxies aren't really protecting you from detection. THAT was the basic premise of trying to help people.

Actually, no, that's bullshit too. If you choose your VPN provider and configure your VPN client properly, you have very little to worry about. The key here is choosing a decent-enough VPN provider, who: a) has decent-enough encryption; and b) doesn't keep logs of your activity and won't hand you over at the first sign of trouble.

 

In my previous response I listed ipredator as a VPN provider - this is from the same people who brought you The Pirate Bay, so draw your own conclusions on how likely is it that they'll grass you up.

 

I also took issue with the tor-is-not-secure nonsense you posted and I see you can't provide anything to substantiate your claims. I'll help you out and educate you on that too.

 

I'll start off with Tor Project: Overview where the nature of the entire tor network and how it all works is described (think of it as "Tor for dummies").

 

Next comes The Register article, which describes the "tor flaw" you referred to in your post and what NSA thought about the tor network being "insecure" ("Tor stinks", they commented!).

 

Finally, I am providing links to a couple of Guardian articles: NSA and GCHQ target Tor network that protects anonymity of web users, Attacking Tor: how the NSA targets users' online anonymity, 'Tor Stinks' presentation – read the full document and Tor: 'The king of high-secure, low-latency anonymity'.

 

Enjoy!

Link to comment
Share on other sites

Nothing since it is just a network which attempts to provide anonymity online. However, if you somehow get nabbed buying drugs, hiring an assassin or looking at under-aged girls fannies then it might get a bit trickier.

 

For my shame, as a software developer I do not know that much about the mechanics behind it but from what I know it relays your traffic across many different nodes making it difficult to trace the request.

 

People underestimate social engineering. It is a skill employed by most hackers and FBI agents. The TOR network is well known to the feds now so caveat emptor.

Fannies, you say

 

Posted Image

Link to comment
Share on other sites

  • 1 month later...
  • 2 weeks later...

Sky have blocked everything I used. I've tried that come.in but half the time either the sites don't work or they try to talk you into downloading some bullshit download software. Suggestions more than welcome.

 

Incidentally I sleep easy downloading movie torrents. I go to the cinema regularly and I pay full whack for sky movies. If a film is good I watch it again when it's on sky. If it's not that good I'll probably end up watching it again anway at some stage. Torrents are like a 'taster' for me.

 

Music is very different. Most bands, especially up and coming bands are touring their arses off trying to pay the bills and ripping them off perpetuates the Simon fucking Cowell talent-free bullshit machine.

Link to comment
Share on other sites

  • 1 year later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share


×
×
  • Create New...