How does this firm (or whatever it is) know I torrented something? My VPN app took a shit in the middle of a download and I think it exposed my IP to some “anti-piracy” bullshit firm that contacted my ISP. ISP emailed to let me know and to “not do it again”. How does this firm know about torrenting? Do they like watch these sites and hope someone’s VPN slips like mine did today?

  • themachine@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    ·
    5 months ago

    They watch the swarm. You can view connections of the swarm. They see your ISP owned IP and send an email.

      • scutiger@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        Many places have laws in place currently stating that you can’t be personally identified by your IP. So if you get emails about piracy and copyright issues coming from a law firm representing rightsholders, the best course of action is usually to ignore them. Responding to them is essentially admitting that you’re the person they’re looking for and that you committed the offense in question.

  • Howdy@lemmy.zip
    link
    fedilink
    English
    arrow-up
    6
    ·
    5 months ago

    Look into transmission open VPN docker container. Forces/ensures VPN connection. Easy to setup and configure.

    • penquin@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 months ago

      I use proton VPN and I have the Killswitch on, but it was the free version and the Windows version of proton VPN doesn’t give me the option to choose the server. It chooses it for you (unlike the linux client which I use as my main most of the time). It apparently used a server that didn’t support p2p and then the download “stalled”. Checked around and found a little window hidden behind qbit torrent that said “your connection was disconnected because you used a server that doesn’t support p2p”. I have windscribe premium, but I’ve noticed that it has IP leak, so I’m just waiting for the subscription to expire and I’m not renewing, and have been testing proton

        • penquin@lemm.eeOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          Will do that. Thank you. Why is having ipv6 on bad? Just curious

          • TheBigBrother@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            5 months ago

            There are VPN services which leak IPv6 addresses, so it’s better if you disable it and I suggest you to use a private DNS service also.

            So disable IPv6, force killswitch and implement secure DNS, you should be fine with that.

    • chicken@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      5 months ago

      killswitch doesn’t work because packets can still get through between the time when the VPN goes offline and when it activates, need to bind torrent client to vpn or have some firewall configuration to prevent non-vpn traffic

  • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    2
    ·
    5 months ago

    I’ve heard they monitor the torrents and try downloading from the peers as evidence of them distributing the content.

    Anyway, you could set up firewall rules to only allow connections via VPN interface (and out to the VPN server, of course).

    • penquin@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 months ago

      I see. Also, could you please elaborate on the firewall bit? I’ve set up some rules on games that force data collection before where I just blocked the in and out on the game, but I don’t fully understand the "only allow connection via VPN). Do you have clear instructions on how to do that? A tutorial? And what does that do? Thank you, btw.

      • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 months ago

        Oof, sorry. This will depend on OS and the software you use for FW configs. I am too dumb.

        For example, I use UFW on Linux. So for me it’s

        # Deny all incoming and outgoing traffic by default
        ufw default deny outgoing
        ufw default deny incoming
        
        # Allow connection to VPN server
        ufw allow out to <VPN server IP address> [port] <VPN server port number> [proto] <tcp|udp>
        
        # Allow connection via VPN interface
        ufw allow out on <interface name> from any to any
        
        # Enable UFW
        ufw enable
        

        That’s just one simple way.

        • penquin@lemm.eeOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          Thank you. I’m not that familiar with UFW, but I have used its UI app, GFUW. I’ll mess with it and figure something out. Does blocking outgoing traffic prevent others from seeing my IP address, or do I need to combine that with a rule that only allows connection to the VPN server?

          • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 months ago

            I am not sure I understand your comment.

            Blocking outgoing traffic blocks all outgoing traffic, thus including traffic outside of VPN.
            Allowing outgoing connections to the VPN server simply makes an exception in that blocking, otherwise you couldn’t even connect to a VPN.