For instance, Tixati can even enforce encryption for both incoming and outgoing connections: They provided the name and the size of the file, along with IP address and port.īut, some (if not all) torrent-sharing programs have an encryption feature. Apparently, he received DMCA notice for torrenting a film (author specifically notes that he did not fully download the film, and everything was done for the sake of experiment). However, in another article (also in Russian) same author shares his experience with torrenting over VPN set in Azure. Most people suggest using VPN in order to conceal torrent traffic. From what I understand, they scan the DHT networks and display torrents that any given IP participated in, and although it is sometimes inaccurate, it can provide data on Internet usage, and thus presents a threat to anonymity. This question is inspired by this article (in Russian) about a website called I Know What You Download.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |