I haveint forgotten @dessalines@lemmy.ml’s Favorite apps and services, and in particular his recommendation for torrents VPN (AirVPN, Mullvad, NordVPN, ProtonVPN).

I’ve never used a VPN, and so far no issues (not really an avid consumer, but I’ve occasionally done torrenting for ~20 years). I use the pseudo encryption supported, and in particular, I use rtorrent wiht:

protocol.encryption.set = allow_incoming,try_outgoing,enable_retry

For sure that doesn’t really mask it, but obfuscates a bit the torrenting from ISP providers, which are not doing a hard work looking for torrenting.

Regarding privacy, my understanding is one should trust no one, :) And it’s hard for me to understand why it doesn’t apply to VPNs…

At any rate, from those suggestions, as of now, which is the one somehow better at protecting one’s identity, privacy and security? That would be my major concern, and if there’s a way to keep that with port forwarding. Not interested on fastest, but rather safest…

I’m wondering how on earth I’ve never had issues, when I always read not using a VPN is sort of nuts.

  • @kixikOP
    link
    22 years ago

    I do use common trackers. If somehow I can keep using them, just slower because of using a more secure layer, then that wouldn’t be an issue, but what I understand is that I wouldn’t be able to use any tracker, right, just some special ones supporting i2p?

    On the other hand, I read I would need a specialized i2p torrent client as well, right? I don’t want to get away from rtorrent, to me it’s the best, I run it on a detached screen (gnu screen), and I have set it up to automate some things as well, and having to just ssh to the host and attach, on such ssh console, to its screen process is just priceless, no need of guis, web, etc…

    So, if I can just set the host to use i2p somehow, and tunnel or route torrents traffic though it, still using any client (in my case rtorrent), and still using any trackers, then let me know how to, :) So far, it seems that’s not possible.

    Also, if there’s a way to enforce encryption, like the pseudo encryption I mentioned, but better, like using specialized universal/proxy trackers that allow finding seeders supporting pseudo encrypted connections to happen at the very start, that would be helpful as well.

    Not discarding i2p at once, perhaps I misunderstood things…

    • @sexy_peach@feddit.de
      link
      fedilink
      12 years ago

      I do use common trackers. If somehow I can keep using them, just slower because of using a more secure layer, then that wouldn’t be an issue, but what I understand is that I wouldn’t be able to use any tracker, right, just some special ones supporting i2p?

      Exactly. You might get lucky and catch a few common torrents, because some seeders might use torrent software that also seeds to i2p.

      On the other hand, I read I would need a specialized i2p torrent client as well, right?

      Yes. You would either have to install i2p, which comes with its own client or install a special torrent client.

      Not discarding i2p at once, perhaps I misunderstood things…

      No worries, it’s not suitable for your use case I think.