How does this firm (or whatever it is) know I torrented something? My VPN app took a shit in the middle of a download and I think it exposed my IP to some “anti-piracy” bullshit firm that contacted my ISP. ISP emailed to let me know and to “not do it again”. How does this firm know about torrenting? Do they like watch these sites and hope someone’s VPN slips like mine did today?
They watch the swarm. You can view connections of the swarm. They see your ISP owned IP and send an email.
Fuckers, but how can they see it behind the VPN?
My VPN app took a shit in the middle of a download and I think it exposed my IP to some “anti-piracy” bullshit firm that contacted my ISP.
I think you answered your own question.
Guess I did. Thanks
deleted by creator
This site is kinda cool
You asshole.
deleted by creator
The same way you can see the ip of your peers on any particular torrent.
be careful, sometimes it’s a scam or a cash grab with no legal basis.
Thank you. That was actually a legit email
Many places have laws in place currently stating that you can’t be personally identified by your IP. So if you get emails about piracy and copyright issues coming from a law firm representing rightsholders, the best course of action is usually to ignore them. Responding to them is essentially admitting that you’re the person they’re looking for and that you committed the offense in question.
Good to know. Thank you
Look into transmission open VPN docker container. Forces/ensures VPN connection. Easy to setup and configure.
Swap provider(just for the doubts) and implement a good way of killswitching it… good luck!!
Proton has a very nice article on how to set up torrenting: https://protonvpn.com/support/bittorrent-vpn/
Oh damn. Thank you for this. Didn’t know it even existed.
You might want to cross post to !piracy@lemmy.dbzer0.com
a killswitch is a must-have in this case then
I use proton VPN and I have the Killswitch on, but it was the free version and the Windows version of proton VPN doesn’t give me the option to choose the server. It chooses it for you (unlike the linux client which I use as my main most of the time). It apparently used a server that didn’t support p2p and then the download “stalled”. Checked around and found a little window hidden behind qbit torrent that said “your connection was disconnected because you used a server that doesn’t support p2p”. I have windscribe premium, but I’ve noticed that it has IP leak, so I’m just waiting for the subscription to expire and I’m not renewing, and have been testing proton
I suggest you to deactivate IPv6 also and force the killswitch.
Will do that. Thank you. Why is having ipv6 on bad? Just curious
There are VPN services which leak IPv6 addresses, so it’s better if you disable it and I suggest you to use a private DNS service also.
So disable IPv6, force killswitch and implement secure DNS, you should be fine with that.
Thank you. I think I’ve seen how it gets disabled on Linux, so that’s an easy task. I’ll also install a firewall app for extra protection. Thank you
Good luck!! 👍🤞
Appreciate you
killswitch doesn’t work because packets can still get through between the time when the VPN goes offline and when it activates, need to bind torrent client to vpn or have some firewall configuration to prevent non-vpn traffic
Getting a seedbox is pretty easy and generally cheap too.
I’ve heard they monitor the torrents and try downloading from the peers as evidence of them distributing the content.
Anyway, you could set up firewall rules to only allow connections via VPN interface (and out to the VPN server, of course).
I see. Also, could you please elaborate on the firewall bit? I’ve set up some rules on games that force data collection before where I just blocked the in and out on the game, but I don’t fully understand the "only allow connection via VPN). Do you have clear instructions on how to do that? A tutorial? And what does that do? Thank you, btw.
Oof, sorry. This will depend on OS and the software you use for FW configs. I am too dumb.
For example, I use UFW on Linux. So for me it’s
# Deny all incoming and outgoing traffic by default ufw default deny outgoing ufw default deny incoming # Allow connection to VPN server ufw allow out to <VPN server IP address> [port] <VPN server port number> [proto] <tcp|udp> # Allow connection via VPN interface ufw allow out on <interface name> from any to any # Enable UFW ufw enable
That’s just one simple way.
Thank you. I’m not that familiar with UFW, but I have used its UI app, GFUW. I’ll mess with it and figure something out. Does blocking outgoing traffic prevent others from seeing my IP address, or do I need to combine that with a rule that only allows connection to the VPN server?
I am not sure I understand your comment.
Blocking outgoing traffic blocks all outgoing traffic, thus including traffic outside of VPN.
Allowing outgoing connections to the VPN server simply makes an exception in that blocking, otherwise you couldn’t even connect to a VPN.