You may set it up to not allow any exit if your ISP won't like that (so that your server won't appear on the actual end of the chain, which is the tracker / forum etc.). Set up a TOR server! It's really easy, and your contribution is needed. That way the nodes in the Tor chain have even less clue about where you're going, they'll only see addresses like this: Make sure you are 100% stealthed at Shields Up!Ħ) Go through the pain of using PeerGuardian to block HTML if you are really paranoid, but I don't think it's worth it.Ĩ) Set up the service you use to be Tor Hidden Services. There is no knowing how many nodes there are between a certain node and you, so this is just so plain stupid I don't think anyone is trying to abuse the Tor protocol right now.ġ) Use PeerGuardian, update everyday, makes you feel good at leastĤ) Set up a browser to use Tor and use that browser whenever you do p2p activity (register and use private trackers, download torrent files from any tracker, post in forums, chat in IRC, using Google/Gmail etc.)ĥ) Set you firewall to block incoming ping requests and outgoing ping replies, and as much else as you can to still have a connection (NetBIOS, other ICMP protocols, IGMP etc.). So to find YOU, the traffic must first be decrypted, then one would have to follow each last node in the chain, get control of it, decrypt it, and so on. So in µtorrent go to Other options and setup Tor as "Proxy Server for HTTP requests." No Tor node should know it's place in the encrypted chain, and the traffic is encrypted. I'm looking for input/experience/advice on any of these methods (and ones I didnt mention).Įncryption & Traffic shaping articles worth noting. While it is more effective from an anonymity view, it seems it might really slow down your transfers. Open transmission -> preferences -> peers Paste the URL into the URL bar and click update (the download should be visible) On the mac finder bar (no program selected) click on go -> go to folder Enter /Library/Application Support/Transmission Select the blocklist folder (notice that there is only one blocklist. ![]() It's not supposed to effect your speeds but I have yet to personally try it. It's said that current versions of PeerGuardian dont use hardly any CPU resources and could help a little. What is currently the best method to protect one's self? PeerGuardian? ToR? I realize that no option is 100% secure but rather offer varying levels of security. Still, I sometimes wonder if I should be doing more to protect my privacy/security when downloading the not so legal warez thats floating around. The aim of its use was to block peers on the same torrent download from any visibility of your own peer connection using IP lists. It is capable of blocking incoming and outgoing connections based on IP blacklists. Fortunately my ISP does not cap/shape my torrent connections. PeerGuardian is a free and open source program developed by Phoenix Labs (software).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |