@tom: I've always admired your sense of humour…
As for the rest of the users, please bear in mind that despite the fact that the existence of this site being "illegal" due to the nature of what it is used for, understand one thing. Just because you "like" something does not necessarily mean that you use that site or service. That being said, since the security of our site has been improved due to a recent scare with a certain production company, there is no way in which to link your Facebook "like" status to your user account. By the same token, there is also no way to directly link your usage (if any) on this site to your Facebook account, or otherwise directly to your identity.
The only way that any such information could be obtained is by monitoring torrent activity through a torrent client and obtaining a direct connection to someone who is actively seeding or leeching a torrent that is looking for such information. Even then, the only thing that anyone would have any way of obtaining is your IP address if it is not masked through a proxy, VPN, or seedbox. All that being said however, there lies a further legal complication when it comes to any potential legal action in most countries. Your IP address will only identify the connection that is being used. With a lot of court paperwork and red tape, it is only possible to obtain the information of the ISP subscriber. The challenge that this presents is that although you can identify the service subscriber through expensive and time costly methods with such information (which is hard enough to gather as it is), in most countries, you must also be able to prove who the user is on the other end of the computer. Short of getting an admission of guilt from the user directly, it is impossible to prove the identity of the user behind the computer, which in most countries makes these efforts useless since one must prove the identity of the user and not the subscriber.
If after all of that you are still worried about the security of your connection, I strongly recommend the use of both a VPN to tunnel your connection through, as well as the use of PeerBlock or PeerGuardian, along with any list updates you can grab for them as they will greatly increase the level of difficulty in being able to trace a connection back to the actual ISP subscriber's connection. And again, even if this is made possible through the magic of a really sophisticated technical guru (which I highly doubt would ever happen in reality with the proper steps taken), it would still leave the question of the identity of the actual user on the other end of the computer.
All that being said, be aware that in some areas such as the United Kingdom, the rules are a little different. In such areas, it is the responsibility of the ISP subscriber to ensure that their internet connection (namely their WiFi connection) is secure. In areas like the United Kingdom, if you fail to properly secure your internet connection, the subscriber is responsible for any actions made using that service.