• Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Torrents

    Encrypted Peers vs. Unencrypted Peers

    The Site
    3
    13
    66
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      Topsersem last edited by

      When I seed, I've noticed a number of unencrypted peers.
      OK, I've set my client to prefer encrypted peers, but unencrypted peers come through and leech.
      Now, given the anonymous status of uploaders on Gaytorrents, what would be the best method to secure private torrent seeding?

      I avoid DHT, btw.

      Thanks for an insight!

      1 Reply Last reply Reply Quote 0
      • csrdan
        csrdan last edited by

        @Topsersem:

        what would be the best method to secure private torrent seeding?

        hard to tell what you really mean by the question: but here.

        regardless of whether you have protocol encryption or not: the end peer knows your address and that you are seeding; of course a normal member can't really work out your username from your address.

        encryption simply obfuscates the traffic from your isp/middleman to avoid "torrent detection/throttling" etc…

        if you want to make sure all connections are encrypted it depends on your client how to do it: for example in utorrent you must set encryption to "forced" and untick "allow incoming legacy connections".

        if you want to be actually anonymous, you must use VPN of some sort.

        1 Reply Last reply Reply Quote 0
        • MrMazda
          MrMazda Global Moderator last edited by

          Not really… While we have a strict privacy policy, the downloads themselves are run directly from peer to peer. This means that your IP address is still shown in the list of peers for where to get the content. This is something that we cannot do anything about. If you're looking for a more secure or anonymous way of torrenting, I would be inclined to suggest a VPN service that does NOT log anything, such as PrivateVPN. As long as the server you are using supports port forwarding, you'll be all set.

          Now, as for the difference between encrypted and unencrypted peers, the difference there is whether or not you are establishing a regular connection to the peer, or if you are using some method of securely scrambling the information while it's being transmitted from one peer to the next. The theoretical difference there being that an encrypted connection cannot be intercepted in the manner that a regular (or unencrypted) session potentially can be.

          Whap The User
          The only difference between martyrdom and suicide is press coverage!

          1 Reply Last reply Reply Quote 0
          • T
            Topsersem last edited by

            Thanks for the responses, folks.
            Sorry if I wasn't too clear
            When I upload, I see that some peers/clients are encrypted and others are not. I can only presume that all connections are coming from other Gaytorrents members.
            Seems reasonable for one to enforce the encryption feature in their client of choice.
            The bottom line question was as to whether or not any traffic here might be visible to outside parties.
            As for VPN, I have that option, but rarely use because it really slows things down and is often prone to DNS leaks.
            BTW, I use the "Tixati" client which I find to be far superior to all the others (except maybe "Qbittorrent" and "rtorrent").

            1 Reply Last reply Reply Quote 0
            • MrMazda
              MrMazda Global Moderator last edited by

              I had a solution for the potential for DNS leaks… I use my own DNS servers now, so that I can control what passes through them, and I can be sure that no information is being skimmed out of the results because I own the actual servers that handle the requests. 🙂

              Whap The User
              The only difference between martyrdom and suicide is press coverage!

              1 Reply Last reply Reply Quote 0
              • T
                Topsersem last edited by

                @MrMazda:

                I use my own DNS servers
                I own the actual servers that handle the requests. 🙂

                Sounds like you're way ahead of the game, Mazda.

                OK, I've used Opennic's servers in the past but, they're not my own - merely replacements for my provider's servers.

                Can you please elaborate? I'm intrigued.

                1 Reply Last reply Reply Quote 0
                • MrMazda
                  MrMazda Global Moderator last edited by

                  I have 4 of them in total, all in different geographical areas, but that's because I also host the DNS services for several different domains online. If I were just using them for regular internet traffic, I would only need one really. Simply put, take a Linux box and install a basic copy of Bind onto it…. It is also recommended to setup RNDC, as this will help with a few things down the line.

                  From there, just be sure to update the root zone from time to time, then configure your computer or network's DNS settings to point to that Linux box. The Linux box will actually do all the DNS resolving for you, pulling the information straight out of the Master DNS servers, which bypasses the need for a 3rd party DNS service, which can potentially lead to DNS inquiry information being leaked. 🙂

                  Whap The User
                  The only difference between martyrdom and suicide is press coverage!

                  1 Reply Last reply Reply Quote 0
                  • T
                    Topsersem last edited by

                    Thanks for the info, Mazda. Sounds perfectly logical when one is maintaining the services you are.

                    Alas, I'm just a lowly but, somewhat savvy end user with an outlook towards maximum achievable security.

                    Granted, no setup can be 100% secure, esp. when dealing with Windows.  :afr2:

                    Have been considering moving to a Linux flavor such as Debian. Better yet, FreeBSD or, even better, an RTOS such as QNX (which is, sadly, no longer offered to end users). And it goes on…

                    Any suggestions? Would love to continue the dialogue!  😉

                    1 Reply Last reply Reply Quote 0
                    • MrMazda
                      MrMazda Global Moderator last edited by

                      I'm a BIG fan of Ubuntu, which is Debian based… Especially when you combine it with a useful little tool such as Webmin. It makes life WAY more straight forward

                      Whap The User
                      The only difference between martyrdom and suicide is press coverage!

                      1 Reply Last reply Reply Quote 0
                      • T
                        Topsersem last edited by

                        I've read that Ubuntu has supposedly been compromised, what with back doors and such like as it is the most popular Linux flavor.

                        As for "Webmin", I looked at it and will seriously keep it in mind when I move up to your level.  😉

                        1 Reply Last reply Reply Quote 0
                        • MrMazda
                          MrMazda Global Moderator last edited by

                          It can be compromised if not properly configured, however if you configure your firewall and any server services you may be using properly, I actually recommend using it as a main firewall. If doing MLPPP though, it won't handle more than two DSL lines at the same time without choking horribly I've discovered.

                          Whap The User
                          The only difference between martyrdom and suicide is press coverage!

                          1 Reply Last reply Reply Quote 0
                          • T
                            Topsersem last edited by

                            What about "PFSense"? Can be implemented on Linux as either soft or hard firewall.

                            That's it! I'm getting myself a SPARC station and never mind the unencrypted peers! :cheers:

                            1 Reply Last reply Reply Quote 0
                            • MrMazda
                              MrMazda Global Moderator last edited by

                              Yes… It  can be if you so desire... To me though it's a little redundant as Linux itself can manage just the same...

                              The ONLY thing that I've found that Ubuntu simply CANNOT do is MLPPP using more than 2 DSL lines. I used to use my Ubuntu server as the central be all and end all for the network, including running the MLPPP to make the internet work. Once I installed a THIRD line however, I began having a great deal of difficulty with getting it going on all 3 lines at the same time. So... I made the switch over to a Mikrotik router. The Mikrotik router now bonds what is currently THREE lines, but as of next week will be FOUR lines together, then shares them out as a single line across the basement to the central switch that everything connects through.

                              If you're not using MLPPP on more than two DSL lines though, I've found that Linux by itself seems to have everything it needs. It's just a matter of knowing how to set it all up.

                              Whap The User
                              The only difference between martyrdom and suicide is press coverage!

                              1 Reply Last reply Reply Quote 0

                              • 1 / 1
                              • First post
                                Last post