this post was submitted on 20 Jul 2025
130 points (93.3% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

63271 readers
172 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):

🏴‍☠️ Other communities

FUCK ADOBE!

Torrenting/P2P:

Gaming:


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
 

I know this is a dumb question... But i cant really aford a vpn like at all, is it possible to torrent without using a vpn in the USA or will i get in some trouble and go to jail if i torrent without a vpn?

The reason i cant get a vpn is because im just broke and im young enough to live with family so i cant really get a job.

you are viewing a single comment's thread
view the rest of the comments
[–] sp3ctr4l@lemmy.dbzer0.com 6 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

In some sense yes, but:

If your TOR entry exit node is comprimised, you are basically fucked.

I've seen estimates that roughly 1/3 of them are comprimised, run by State actors of some kind.

People seem to forget that TOR was originally invented by the US Navy and used by them and the CIA and shit to move sensitive data around in the early 2000s, possibly late 90s.

Then they handed it off to the public.

Do you really think they do not know how to defeat it, when they really want to?

...

Also... I2P traffic is more anonymized/encrypted than TOR traffic is, in that each chunk in each packet is anonymized and encrypted... each packet is kind if a sausage of a bunch of people's data being moved around all at once, the whole point is you can't tell whose data ia whose.

IIRC, TOR packets do not work this way, they're specifically addressed to a single encrypted and anonymized person.

So, its easier to reverse engineer who is the actual person using the network.

Whereas with I2P, you're always routing for others as well as receiving your own data, albeit much, much more slowly.