this post was submitted on 21 Oct 2023
616 points (97.5% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54758 readers
641 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 
  1. It doesn't make you anonymous. Torrent protocol wasn't designed with anonymity in mind and there are a million ways you're going to leak your actual IP address.
  2. Tor is a TCP only network.
  3. While this doesn't give you the anonymity you wanted, it will hurt the network for other users.
you are viewing a single comment's thread
view the rest of the comments
[–] emptiestplace@lemmy.ml 25 points 1 year ago (1 children)

and sometimes we do care about successful delivery but need to handle that ourselves so we use UDP to avoid layering delivery verification mechanisms.

https://openvpn.net/faq/what-is-tcp-meltdown

[–] PraiseTheSoup@lemm.ee 4 points 1 year ago (2 children)

and sometimes we do care about successful delivery but need to handle that ourselves

Am I right to assume this is generally carried out by the users' torrent client which is why we prefer UDP for torrenting?

[–] emptiestplace@lemmy.ml 1 points 1 year ago

I'm definitely not an expert on Bittorrent, but I believe the person above was incorrect - I think there are some extensions to the protocol that enable UDP transport, but typically Bittorrent traffic occurs primarily via TCP.

What you said makes perfect sense in that hypothetical context, though!

[–] Natanael@slrpnk.net 1 points 1 year ago

Torrents are literally built around file hashes so yes