📜 ⬆️ ⬇️

how to cover your ass [torrents and spying on them]

In the light of the whistle around building lists of users of torrents, we can say the following:

1) So far this is nonsense, but in the future it can become serious [10 years ago nobody believed that it was possible to cover the trade in disks] So you have to start thinking now.
2) The only means of user authentication in this case is IP.
3) According to the existing legislation (correct if I am not right) all articles about the violation of related and copyright rights require the intent of the accused.

The solution is very simple: we put a wifi-router at home. Open to the outside an open public network with a slaughtered channel (kilobits per 100). We are closing (if someone cares about) the 25th port.
')
What we have?

1) Any traffic originating from your network could be sent by unauthorized persons who connected without your knowledge to your network; which can be easily used by any competent lawyer who argues that the charge was not brought to the proper person.
2) Losing 100 kilobits of megabit tariffs.
3) Loss (possible) of quotas for resources that account for IP
4) Possible ban on some resources for the status of "open proxy" and the tricks sucked.
5) Internal satisfaction of sharing the Internet with those who do not have it now.

Alternatively, you can raise the tor exit node ...

UPD: First of all, it’s not about “evil organs” that computers will be confiscated about, but about the scheme: copywriting, copywriting data about IP, provider data, proof of compliance with IP and a person.

Source: https://habr.com/ru/post/92902/


All Articles