this post was submitted on 14 Sep 2024
178 points (97.8% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

53939 readers
254 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


founded 1 year ago
MODERATORS
 

Regular users in Sweden are in danger because a corporation needs to fill their pockets. Studios are suing your ISPs to get to you.

Use I2P. It will hide your IP address (among the many things it can do), afford you more privacy and allow you to torrent freely, even without a VPN/seedbox. The catch? You'll have to add the I2P trackers to your torrent.

I believe I2P is the way forward for piracy and I look forward to it getting bigger than it already is.

top 50 comments
sorted by: hot top controversial new old
[–] x00za@lemmy.dbzer0.com 10 points 4 days ago* (last edited 4 days ago) (1 children)

I set it up earlier and it felt like a highschool project. The AiO bloat, the GUI, lots of little bugs everywhere... The service didn't even stop when I ran i2p stop.

I'm not against it, but I do hope it gets a lot better.

[–] Findmysec@infosec.pub 9 points 4 days ago* (last edited 4 days ago) (2 children)

The OG I2P program is written in Java, which might show behavior like you mentioned (didn't stop immediately when stopping the service).

Please try I2PD, it's written in C++

[–] Andromxda@lemmy.dbzer0.com 2 points 4 days ago

I agree, i2pd is so much better than the legacy Java client, it should really become the default client for I2P.

load more comments (1 replies)
[–] ExcessShiv@lemmy.dbzer0.com 31 points 5 days ago* (last edited 5 days ago) (4 children)

A proper VPN provider is sufficient to protect against this though. If you, as a Swedish citizen, weren't already using a VPN, you were being an idiot.

I mean, it still makes sense to also use I2P, but it is currently not good enough as a full replacement.

[–] Findmysec@infosec.pub 21 points 5 days ago (11 children)

A VPN company can easily give up your details to the police who are now actively going after citizens. VPNs are not enough anymore.

Is there a problem with I2P adoption? I'm sensing a massive lack of interest from this thread

[–] 1984@lemmy.today 23 points 5 days ago* (last edited 5 days ago) (8 children)

If there are no logs, there is nothing to give up. There is no law that they have to keep logs as far as I know.

Don't get me wrong, I'm interested in i2p. Thanks for posting.

load more comments (8 replies)
[–] Abnorc@lemm.ee 13 points 5 days ago (3 children)

I admit that I’m skeptical since everyone is a node. It probably is fine, but I don’t know the risks that I take by volunteering as a node. I thought that VPNs can be fine as long as they don’t store logs, but I could be mistaken.

[–] ReversalHatchery@beehaw.org 17 points 5 days ago

as a node

  • you are unable to see the contents of traffic you route thanks to layered encryption
  • you wont be routing traffic to the internet (unless you specifically set it up), but only to other I2P routers
[–] Findmysec@infosec.pub 8 points 5 days ago

VPNs usually do store your IP when you connect to them, even if they delete it later (it is technically impossible to not know the IP address of whoever is connecting to the VPN). And the likes of Mullvad and IVPN do not allow port-forwarding.

I will repeat what I said to the other commenter: please read the documentation. Being a router doesn't mean that traffic and its contents can be linked to your identity. Data is broken down into chunks and encrypted along with metadata being scrambled. Unless there's a zero day I'm unaware of, you are perfectly safe.

load more comments (1 replies)
load more comments (9 replies)
[–] melroy@kbin.melroy.org 13 points 5 days ago

People who accepted this situation, promoted or even have implemented this are also idiots. Be warned, this can happen in every country, both US and in EU..

load more comments (2 replies)
[–] Andromxda@lemmy.dbzer0.com 24 points 5 days ago (2 children)

Does anyone know of a fairly uncomplicated method to set up my seedbox, so I can seed on the clearnet and I2P at the same time, without having to store two copies of all my torrents? I already seed terrabytes of torrent data, and I don't want to store duplicates of all that.

[–] Findmysec@infosec.pub 17 points 5 days ago (1 children)

Unfortunately, Qbittorrent's I2P support is still experimental. Assuming your seedbox provider can let you run BiglyBT or any other client that can cross-seed, all you have to do is add I2P trackers to your torrent file. You can also upload your torrent files to Postman on I2P for them to be registered.

[–] Andromxda@lemmy.dbzer0.com 6 points 5 days ago

Thanks for the informative reply

[–] ReversalHatchery@beehaw.org 9 points 5 days ago (1 children)

I know nothing about seedboxes, but on a computer you can point multiple torrents to the same directory. If you make it read-only, by permission or mount options or whatever, the torrent client can't even fuck it up

[–] Andromxda@lemmy.dbzer0.com 7 points 5 days ago (14 children)

I know nothing about seedboxes

It's basically just a cheap virtual server running e.g. Deluge or ruTorrent, hosted by a torrent-friendly provider in some country that doesn't give a fuck about DMCA notices. Most don't allow the user to access the underlying Linux system though, but mine does actually give me a root shell.

I'm gonna have to look into deploying another torrent client on the seedbox, besides my current ruTorrent installation. My provider also offers dedicated servers. They're more expensive, but I might go with one so I can seed on the clearnet and I2P. It will probably have enough overhead CPU, RAM and bandwidth, so I can also run a Tor node and maybe IPFS.

load more comments (14 replies)
[–] cupcakezealot@lemmy.blahaj.zone 18 points 5 days ago (1 children)

remember kids do what johnny appleseed did and always seed more than you take.

[–] Findmysec@infosec.pub 9 points 4 days ago

If only people with the resources would seed

[–] Grass@sh.itjust.works 14 points 4 days ago (1 children)

I haven't used I2P since high school or maybe earlier if it existed then. Was it one of those faster the more people are using it things? I was skimming over setting up the docker container thinking even if I don't use it myself it might help others (and I have unlimited data on the isp plan) but I haven't gotten around to actually setting it up.

[–] Findmysec@infosec.pub 14 points 4 days ago

Yes, because it's P2P, every node acts as a router and thus distributes bandwidth to prevent congestion

[–] foremanguy92_@lemmy.ml 10 points 4 days ago

100% right this is the way of helping the piracy

yes! Please seed more on i2p!

[–] melroy@kbin.melroy.org 16 points 5 days ago (1 children)
[–] sploodged@lemmy.dbzer0.com 29 points 5 days ago (5 children)

similar yes but not the same. tor held together by volunteer that run nodes, i2p everyone is a node. tor good for clearnet things, i2p good for in-network things. torrenting in i2p is good for i2p, not tor. torrenting in i2p stays in the i2p network, doesn't go through exit nodes. there's only about 3 of those. it's torrenting as a darknet hidden service.

[–] melroy@kbin.melroy.org 18 points 5 days ago (3 children)

Yeah, thanks for clearing this up. I was also reading: https://geti2p.net/en/comparison/tor if people want to know more in depth.

load more comments (3 replies)
[–] AlexWIWA@lemmy.ml 11 points 5 days ago (2 children)

Does being a node open one to liability?

[–] Findmysec@infosec.pub 6 points 4 days ago

Unless there's a zero-day, no. All traffic is encrypted and it should be impossible to correlate traffic chunks to identities like that

[–] Andromxda@lemmy.dbzer0.com 5 points 5 days ago* (last edited 5 days ago)

No, since they don't act as exit nodes (they're called outproxies in I2P), unless you specifically configure that. It's like running a Tor middle/guard relay. I2P was specifically designed that way, so everyone can use I2P and be a node by default without causing any trouble.

load more comments (3 replies)
[–] Imgonnatrythis@sh.itjust.works 16 points 5 days ago

It's not big at all. But agree, this is the way.

[–] GatoEscobar@lemmy.dbzer0.com 5 points 4 days ago (1 children)

Another question would be how to make a seedbox service use I2P. I have seem some but none of those didn't mention I2P as a feature

[–] Findmysec@infosec.pub 3 points 4 days ago

Yes, that's a bit of a problem on the average seedbox. You'd have to modify your torrent to seed on I2P by adding I2P trackers (just a couple of them, nothing much), and then run either BiglyBT or I2PSnark to seed them on I2P. Unfortunately, most seedboxes don't give you root access, neither do they bundle these apps. Qbittorrent doesn't have good support for it yet unfortunately.

If you have an SBC/spare computer at home, would be great if you could attach a hard drive to it, install i2p/i2pd and either of the mentioned torrent clients, and seed from there in the meantime. Qbittorrent has seen community interest in I2P, unfortunately it's just not there yet

[–] aida@lemm.ee 10 points 5 days ago

seed!!! I have already started my i2p setup and i will donate my bandwith

[–] Pulptastic@midwest.social 4 points 4 days ago (1 children)

I have lots of questions. I’ve always heard to use a VPN that doesn’t keep logs, this is the first I’ve heard of i2p. If I add i2p trackers that implies I still have non-i2p trackers so can still be identified. I feel like I need way more information on how to do this safely before I change anything.

[–] Findmysec@infosec.pub 5 points 4 days ago* (last edited 4 days ago)

Obviously, this doesn't change anything if you're still seeding to the clearnet. All this would do is cross-seed your torrents to the I2P network. I assume you have a suitable torrenting strategy already for the clearnet. If some day you were to abandon the clearnet for I2P, you would no longer need to take the precautions you do now because I2P is inherently private.

Please skim through the documentation for a high-level overview on I2P, and ask here if you don't understand something

[–] narF@lemmy.ca 5 points 4 days ago (1 children)

Isn't it difficult to setup?

[–] Findmysec@infosec.pub 10 points 4 days ago

It's very easy to set up. Windows now has a slick installer.

load more comments
view more: next ›