So, a couple people went down because OpSec was broken by rival scene groups outing people’s identities; from there things started to crumble more and more.
Most Publishers in any Industry are a cancer on society. Cramming DRM in where they can while scalping both customers and creators whilst gaslighting both into believing continuing to shovel money to their overpriced services is in their best interest.
I say most because if there is even a single one doing what they are supposed to do then saying “all” would be wrong and I am aware of at least one offering drm free ebooks (unless you consider an embedded username in the epub file drm) at reasonable prices while (as far as I am aware) not fucking over the authors
The worst development of all has been the „buy but dont own“ model. If I buy anything, I own it. It’s symple, reliable and permanent. Obviously, if I own something, I can sell it. If someone owns a video game, music or a movie, they can sell it. This perverted idea of being able to tell a customer what to do with their bought stuff needs to go.
Man, that’d be horrible! Imagine people could exercise their rights. Thank God we live in a world of zero digital ownership with anti DRM circumvention laws to strip everyone from rights copyright laws are supposed to grant. We can sue anyone that scans books and lends them out 1:1 as that’s untransformative and unfair use. But hey, it’s a free market! Let’s offer them e-books with DRM for $15 that libraries can only lend out 15 times, 20 hours total read time or three months after purchase, whichever comes first, and then jack up the price to $30 when they’re locked into the ecosystem. Sounds like a fair deal to me! Not like they have an alternative.
At this point its pretty much a moral transgression to buy music from any labels, organizations, or groups filing these lawsuits. If no one bought their music, they’d have to join a mock trial team or debate club and we might finally be able to straighten out the mess that is copyright law. :-D
Funny thing is… you can still find it with duckduckgo, search.brave.com, qwant, searx…
plus even on google, you can click any of the first several links - including wikipedia - and the link is easy to find. sadly ‘reddit pirate bay’ is easy to find TPB link from but ‘lemmy pirate bay’ doesn’t have TPB link without more searching (and even more sad, the first result isn’t dbzer0 but a community on the ml instance)
And that is why I don’t torrent, living in Germany. Even just leeching will put you on the radar of, at best scam law firms, at worst motivated rights-holders.
qbt only ever sees the VPN as its network. It is logically isolated from my main gateway.
there are healthchecks running, so if the VPN fails qbt enters in a restart loop until the VPN is back to a healthy status.
I use private trackers for 99% of my torrents.
You also have to know that these scummy law firms use honey pot attacks, where they advertise themselves as leechers and record your IP if you upload to them. Technically a proxy to another country would just be enough here, but hey, this works too and I sleep better.
Since you use a torrent container and a vpn container I am interested in how you manage to communicate with the torrent container.
Do you utilize the *arr stack? Also with a docker?
If the answer is yes, how did you achieve the communication between the containers?
Reason I am asking is, that I want to connect to my other container but when I bind my container to the service I am unable to let it communicate directly with it.
By that logic, I’d need to access the container through the vpn container, right? (*arr <-> vpn container <-> downloader container)
After much thinking I managed it myself and found that out as well. What I also needed was the environment variable FIREWALL_OUTBOUND_SUBNETS so my other containers could connect to the container.
It’s really easy for a law firm in Germany to find out who the IP belonged to, if they have proof that the IP infringed on their copyrighted media.
The law firm looks at torrents and downloads a bit. With the IP, time and media name they can send a cease and desist letter with a fine of hundreds to thousands of euro. Ignoring the letters is not possible.
This is possible because the law firm has contracts with many big copyright holders (Disney, …).
But most of the time the fine is too high, so it’s possible to pay half by getting a lawyer. Basically the copyright holder overestimate how much damages they can get for the distribution of copyrighted material. If I understand it correctly. IANAL.
It’s simple to avoid by binding the torrent client to the network interface of a VPN, but not everyone knows that.
Not if you use a VPN though. Also, modifying the letter, so it doesn’t include you admitting to the crime has proven effective for me (I was young once and didn’t use a VPN)
The letter is also pretty toothless since in a household with more than one person the actual infringer cannot be identified solely by IP, still better to just use a VPN though, avoids that entire can of worms
It’s also very easy to avoid this little problem by not being the only adult in the household. Unless one of the at least two adults snitches they can’t sue because there is reasonable doubt about the actual infringer (not legal advice, better option is to just get a VPN)
A company admitting they comply with the law when ordered to by the court is a positive to me as it means that they don't do it unless they don't do it on a whim and they are complying with the law, which would most likely also include privacy laws. Any company that would refuse a court order is going to be shut down and probably have all of their records turned over instead of the narrow subset that would be ordered by a court.
What you want is for them to demonstrate incapacity to comply. “We’d love to help your honor, but as we sell a privacy service we don’t log user activity”
"From day one of our operations, we have never provided any customer data to law enforcement, nor have we ever received a binding court order to log user data. We never, for a second, logged user VPN traffic, and the results of multiple audits prove that we are true to our policies," the company said.
In the event the company does receive information requests from a law enforcement agency, NordVPN says it "would do everything to legally challenge them."
"However, if a court order were issued according to laws and regulations, if it were legally binding under the jurisdiction that we operate in, and if the court were to reject our appeal, then there would be no other option but to comply. The same applies to all existing VPN companies if they operate legally. In fact, the same applies to all companies in the world," NordVPN said.
So they don't log and are just admitting that they might need to if they were forced to. That is extremely reasonable.
You do you but it also means that if they suspect you of illegal downloads or streams and get that court order, that they'll log that shit and then you'll receive those lovely letters eventually, making the whole point of the VPN pointless.
"From day one of our operations, we have never provided any customer data to law enforcement, nor have we ever received a binding court order to log user data. We never, for a second, logged user VPN traffic, and the results of multiple audits prove that we are true to our policies," the company said.
NordVPN being trash xD Not only because of that. Complying with the law is a ok. I just hate their whole vpn and security propaganda. Like, you will be hacked without us… And they have been hacked, if I remember correctly it was twice…
There are better commercial VPN providers.
Sadly ovpn.to went down some time ago. Cheap, secure and Mr. Nice was really nice and helpful. He probably died -.-
Freaking slow, exactly like Tor imo. The last torified torrenting test was many years ago. Speeds were at 100kb/s. Nope. With double VPN I’m at ~150 Mbit/s during torrent downloading.
If more people would torrent over i2p with great internet connections the experience would get better, since all i2p users are part of the network of servers. The slowest connection in the multiple hops decides the connection speed.
Because all traffic is encrypted and doesn’t leave the i2p network, forwarding traffic from unknown systems is not an issue, similar to Tor middle nodes (Tor Exit nodes shouldn’t be hosted at home).
I don't even know which ones they closed down, the ones I use are still up. Probably a couple good ones and a bunch of low traffic, easy to target ones.
torrentfreak.com
Active