For casual pirates who torrent on their personal windows devices sure, but I can only see 2 reasons to be concerned about DHT and both of them are solved by things that any serious pirate should be doing anyway:
Ip leaks: your torrent client should be in an isolated network namespace or in a docker container with isolated networking that only has access to a VPN - it should not rely solely on a network killswitch
Malware: If your piracy setup is at risk of executing binaries should they appear in any downloaded torrent, something you’re doing is very wrong. I don’t even run torrent clients on windows, and my home seedbox runs Debian with everything in read only unprivileged containers
These are good things to follow even if you don’t use DHT.
For casual pirates who torrent on their personal windows devices sure, but I can only see 2 reasons to be concerned about DHT and both of them are solved by things that any serious pirate should be doing anyway:
Ip leaks: your torrent client should be in an isolated network namespace or in a docker container with isolated networking that only has access to a VPN - it should not rely solely on a network killswitch
Malware: If your piracy setup is at risk of executing binaries should they appear in any downloaded torrent, something you’re doing is very wrong. I don’t even run torrent clients on windows, and my home seedbox runs Debian with everything in read only unprivileged containers
These are good things to follow even if you don’t use DHT.
true