How does this coverage hold up? It was a fun read from back in my highschool days, when I was still five years from trying Linux on my own AMD Thunderbird 1Ghz. It wasn’t until 2008 that I tried again and it stuck.
Yeah, that’s not quite right. You need a means to discuss things and review code. You can do this via a website or mailing list. The Linux kernel uses the latter. Lots of other devs use the former. Like Github. And Github and Git aren’t the same. The issue tracking, discussion platform etc are something Github does on top of Git. You can as well use Email or a different service/online platform for the communication. The actual program code is stored in Git in both cases.
Both work quite differently. TOR routes you over several layers, obscures your IP and changes the IPs around occasionally so you can’t be tracked.
With Bittorrent you want lasting connections to other peers to be able to receive and send all the data. This doesn’t align with the ever changing IPs and stuff.
A VPN gives you one IP that you can have for hours.
A VPN supports UDP connections, TOR doesn’t.
Connecting your Bittorrent client to the Socks-Proxy of a TOR client is a different setup than it just sending normal packets through a VPN tunnel.
TOR is slow (by design), a VPN is fast.
If your client or something leaks your IP it happens anyways, if you route it over one node or seven. All the extra energy is just wasted.
And bittorrent puts even more strain on the TOR network the way it works. Making it slower for anybody else. And (ab)using the resources volunteers provide. (And which are meant for better use-cases.)
Well, I don’t know the exact reasons. I read somewhere that it’s been a frequent issue. That has either to do with the way the torrent client is programmed and it doesn’t pay attention to the specifics for that case. Or the users frequently get the config wrong.
For example: Since Tor doesn’t support UDP, if your torrent client sends out a UDP packet, it goes over your normal internet connection, immediately revealing your real IP. Whereas if you used a VPN, the packed had been tunneled and that would disguise you.
Also the Socks-Proxy setup is more complicated. Seems to be the case there are just many more possibilities to get it wrong.
I don’t know any reason why you couldn’t theoretically get it watertight. But you have to pay close attention to do it right.
There could be specifics to torrent traffic that expose you in some way. I’m not sure, you’d need to ask a security expert about this. But a torrent download is another kind of data stream than the web-surfing Tor was made for. I know there was research done on Tor. I can only speculate.
The relays don’t have access to the content, it’s encrypted. But the exit-nodes can see what you’re transmitting. They just don’t know who you are because they got your data forwarded by the relays.
It’s probably more they either optimize for speed or for privacy. You sometimes can’t do both. Including IPs is usually done to find the best and direct connection between peers. It’s not shady per se. But it’ll harm you if it’s the default.
I am sorry this the only screenshot i have, my laptop fan suddenly started up and wouldnt stop for like an hour so i opened sytem monitor and this was taking 25% cpu usage
Yeah, next time don’t panic. Use ps and pstree and fuser (or the programs you like) to first find out the executable filename with full path and which program started it. Then you can kill it and you’ll have some info to start debugging things.
[Old 1997 story] The Greatest OS That (N)ever Was (www.wired.com)
How does this coverage hold up? It was a fun read from back in my highschool days, when I was still five years from trying Linux on my own AMD Thunderbird 1Ghz. It wasn’t until 2008 that I tried again and it stuck.
If BT over Tor is bad for privacy, why VPN is not?
This is an continuation of my last post, specifically a comment from @rufus:...
this random process was using 25 % cpu is this a virus? (lemmy.ml)
I am sorry this the only screenshot i have, my laptop fan suddenly started up and wouldnt stop for like an hour so i opened sytem monitor and this was taking 25% cpu usage
Is BT over Tor still not recommened? (blog.torproject.org)
It’s been 13 yesrs after this blog was written. Does the claim still holds true?