this post was submitted on 05 Nov 2023
-25 points (26.4% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54462 readers
286 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Both work quite differently. TOR routes you over several layers, obscures your IP and changes the IPs around occasionally so you can't be tracked.
With Bittorrent you want lasting connections to other peers to be able to receive and send all the data. This doesn't align with the ever changing IPs and stuff.
A VPN gives you one IP that you can have for hours.
A VPN supports UDP connections, TOR doesn't.
Connecting your Bittorrent client to the Socks-Proxy of a TOR client is a different setup than it just sending normal packets through a VPN tunnel.
TOR is slow (by design), a VPN is fast.
If your client or something leaks your IP it happens anyways, if you route it over one node or seven. All the extra energy is just wasted.
And bittorrent puts even more strain on the TOR network the way it works. Making it slower for anybody else. And (ab)using the resources volunteers provide. (And which are meant for better use-cases.)
Yes. That's how I see the problem.
I understand and agree.
In the context of this question, I don't really cares if the IP changes or if UDP supported or the network degraded. I'm asking a more fundamental one: when the data in the BT protocol contains sensitive information, then why VPN/I2P is acceptable but Tor (or other transport) are not? That sensitive info is still being transmitted. If that Tor blog is true, then no matter what we use, it is still bad for privacy.