- It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address.
- Tor is a TCP only network.
- While this doesn’t give you the anonymity you wanted, it will hurt the network for other users.
That’s what Tribler is for
Tribler is the only thing I found to bypass my network torrent block for free (no vpn).
I haven’t used tribler in years, how does it compare to downloading regular public torrent sites? (like the defunct rargb)
For bittorrent and p2p it is better to use i2p, tor only to surf the internet.
Indeed.
Torrenting over I2P is the future. No need for VPN and no dependency on donated bandwidth like with Tor.
The technology needs a bit of refinement and it seems they are struggling to attract and maintain good developers.
In my opinion, the fundamental protocols of I2P need a revamp to make torrenting faster and more efficient.
It will take a few years before we solve these problems.
I2P is still around? I remember experimenting with it a decade ago. Sounds like it’s still a slow experience.
It is a different anonymity network, which works differently in many aspects.
I2P and Tor comparison: https://geti2p.net/en/comparison/tor
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): https://geti2p.net/en/docs/applications/bittorrent
Currently BiglyBt supports I2P and it has been that way for quite some time.
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.
Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.
…
Near as I can tell:
Tor is about privacy (and is prone to being compromised but…). So long as the exit nodes are in “friendly” countries and are run by trustworthy individuals (…), you are “safe”. And that is why it is popular among journalists. The downside being that a lot of heinous shit is done on Tor and those exit nodes are potentially liable for them.
I2P is about avoiding censorship. Everyone is an exit node and cops kicking down doors doesn’t significantly hurt the network.
But… I would very much NOT use that for torrenting. Because the endpoints can still be detected and recorded. And “I wasn’t downloading that Tay Swizzle concert, I was just letting potentially thousands of other people use my computer to download it… Why did you suddenly start laughing and talking about The Pirate Bay?”.
And that also ignores the “darker” parts of the dark web. Where, rather than getting a letter from the MPAA you get a visit from Chris Hansen.
I2P is a P2P darknet. on tor the network is run by volenteers (~6000 nodes) while on I2P everyone on the nerwork is a node, and their are no built in exit nodes (in i2p their called outproxies). the official I2P router has a built in torrent client as well. like torrents the more people on i2p the faster the network, while the opposite is true for tor.
Edit: I misread the statement. Thanks for pointing this out to all the repliers! My fault.
The first point of the answer is misleading. Tor is indeed designed with anonymity in mind. The leaks occur in different layers, like the for e.g. chosen BitTorrent client.
https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea/
Any plan on doing torrent over veilid?