Questions tagged [torrent]

The BitTorrent protocol constitutes a decentralised file-sharing network.

59 questions
2
votes
3 answers

Torrented files under my IP address

Last year (2018) I was accused of torrenting Files whilst in my residence in Germany. I have never torrented any file ever. One thing that stands out is that during the same day CyberGhost (the VPN [paid license] provider I use) installed a plug-in…
Martin
  • 29
  • 1
2
votes
2 answers

Are most warez malicious?

There are many big torrent uploaders, some marked as 'VIP' or 'Trusted' and whatnot with many seeders and good reviews. How likely is it that their software is malicious with some kind of evasive rootkit? They are reverse engineers after all. What…
user201668
  • 21
  • 2
2
votes
3 answers

Can using torrent help me obfuscate Tor-over-VPN traffic?

There is tremendous misinformation about Tor in my country's mainstream media so, even though i use Tor for everyday surfing, I'd like to hide it from my ISP. Currently, I use a VPN whenever I am online, tunneling also other traffic such as…
Gigiisbae
  • 95
  • 1
  • 7
2
votes
2 answers

Can visiting Pirate Bay itself give you malware?

So I have a MacBook running High Sierra latest version and I decided to go to the Pirate Bay search engine for the first time just for seeing how it looks and just some research. So I searched for Adobe photoshop for Mac and it showed up I clicked…
nobody user
  • 133
  • 4
2
votes
0 answers

Tracing torrent activity behind a proxy

I've got a question about how it is that one may have their torrent activity traced if you are using a proxy. Specifically, I have the following behind a "Socksv5 w/ Auth" proxy in the Deluge bittorrent client: Peer Web seed Tracker DHT When I…
tendim
  • 121
  • 3
2
votes
1 answer

proxy services for torrents vs encrypting data

I've noticed growing popularity in proxy services for torrent clients; such as BTGuard. Most torrent clients encrypt traffic so aren't these services pointless? I read that it's because the encryption is only for obfuscation, but how does this make…
Celeritas
  • 10,039
  • 22
  • 77
  • 144
2
votes
0 answers

Router reporting DoS-Attack from rival provider

In my (netgear) routers logs there are entries like the following, often multiple times a second since quite some time. [DoS Attack: RST Scan] from source: 80.218.64.172, port 10646, Tuesday, September 29, 2015 10:33:01 The IP-Address is always the…
1
vote
1 answer

How to perform analysis on a potentially malicious .torrent file?

I was recently sent a .torrent file from what I had thought was a trusted source, but when I opened it with qBittorrent, the computer automatically rebooted. I had already scanned the file with Kaspersky and Windows Defender, which both showed it…
1
vote
1 answer

Is Deluge safe to use still when it's not been updated since the first part of 2017?

https://dev.deluge-torrent.org/wiki/Download https://ftp.osuosl.org/pub/deluge/windows/?C=M;O=D The latest version of Deluge for Windows that can actually be downloaded and installed is deluge-1.3.15-win32-py2.7.exe from 2017-05-12. That's well over…
Farbod J.
  • 11
  • 2
1
vote
0 answers

How can I stop an authorized user from consuming all the bandwidth on my home network?

Me and my neighbours share a home network managed by me, paid for by the landlord. This person overloads the bandwidth on the regular, jitter spikes up to the 300s,down speed fluctuates, overall shit time. Can't get rid of them/ block them from…
1
vote
1 answer

What torrent software should I be aware of as a security professional?

I am new to the torrent world and want to experiment / learn with the lowest risk possible. What do I need to know about torrent software, and related software and network configuration in order to send receive data in a secure or even anonymous…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
1
vote
1 answer

How to secure your Mac when downloading torrents?

I need to download some files which are distributed as a torrent. The files aren't pirated / restricted so i dont need to worry about a VPN. My main concern is securing my computer when downloading the files. Im using a macbook pro running 10.10.5…
sam
  • 536
  • 3
  • 14
1
vote
0 answers

How is the security / privacy in Azureus Vuze

I recently heard some people worrying about the privacy in Vuze. There are some rumors claiming that Vuze is not only malware infected, but also has a telemetry function to sell the users' information to third parties. How is the security and…
Richard R. Matthews
  • 1,139
  • 2
  • 9
  • 13
1
vote
0 answers

DHT and PEX; what peers do they show

I am using the current utorrent version for Mac I have a question regarding DHT and PEX. I have read a few articles that suggest that DHT updates other peers as to who is actively in a swarm a for a torrent. 1) When I have a torrent that's currently…
tomeY
  • 11
  • 2
1
vote
1 answer

Can Tor guarantee anonymity when downloading torrents?

I know it is generally a bad idea to download torrents using Tor, as Tor is not designed to support such large data transfers and the bandwidth is limited. However, I wanted to know if, when Tor is set as a proxy in a torrent client, can the peers…
Fitz
  • 113
  • 4