[-] Findmysec@infosec.pub 1 points 3 days ago

Just find an unit with unmetered bandwidth, why do you need dedi?

[-] Findmysec@infosec.pub 2 points 3 days ago* (last edited 3 days ago)

I do seed stuff (I downloaded a TV show of around 40GB last month and I've been seeding it since). It just keeps seeding at full speed till the time they throttle my bandwidth. Last I checked I was over 7 in ratio for that thing, but whatever. It works out because I don't leech much

I will eventually move to a VPS provider who doesn't mind public torrents (I'll pay through XMR). This seems like a much better idea since my needs have diversified and I'd like everything together on one machine to save costs. There's other ways to use your seedbox too (without root access) and seed stuff that people really need/are deprived of (vague description on purpose).

[-] Findmysec@infosec.pub 3 points 3 days ago

Yes, that's a bit of a problem on the average seedbox. You'd have to modify your torrent to seed on I2P by adding I2P trackers (just a couple of them, nothing much), and then run either BiglyBT or I2PSnark to seed them on I2P. Unfortunately, most seedboxes don't give you root access, neither do they bundle these apps. Qbittorrent doesn't have good support for it yet unfortunately.

If you have an SBC/spare computer at home, would be great if you could attach a hard drive to it, install i2p/i2pd and either of the mentioned torrent clients, and seed from there in the meantime. Qbittorrent has seen community interest in I2P, unfortunately it's just not there yet

[-] Findmysec@infosec.pub 2 points 3 days ago

Which plan? I used to use them too

[-] Findmysec@infosec.pub 6 points 3 days ago

Unless there's a zero-day, no. All traffic is encrypted and it should be impossible to correlate traffic chunks to identities like that

[-] Findmysec@infosec.pub 2 points 3 days ago

I'm assuming your seedbox providers allows you root access to the server? Which provider is this?

[-] Findmysec@infosec.pub 9 points 3 days ago

If only people with the resources would seed

[-] Findmysec@infosec.pub 5 points 4 days ago

The point is that logs are generated and then deleted but companies who do not wish to keep such logs (e.g. IP address of client who connects to the VPN). I2P sure to it's design, doesn't even generate such incriminating logs (it might generate other kinds of logs which is a different discussion).

Thanks

[-] Findmysec@infosec.pub 8 points 4 days ago

VPNs usually do store your IP when you connect to them, even if they delete it later (it is technically impossible to not know the IP address of whoever is connecting to the VPN). And the likes of Mullvad and IVPN do not allow port-forwarding.

I will repeat what I said to the other commenter: please read the documentation. Being a router doesn't mean that traffic and its contents can be linked to your identity. Data is broken down into chunks and encrypted along with metadata being scrambled. Unless there's a zero day I'm unaware of, you are perfectly safe.

[-] Findmysec@infosec.pub 5 points 4 days ago* (last edited 4 days ago)

VPNs log your IP. And Mullvad doesn't allow port-forwarding, which means you can't seed.

Being a node for traffic doesn't mean it can be linked to your identity, because everything is encrypted and metadata is scrambled. TOR node operators take much greater risks because depending on how they have set it up, it can lead to their identity being compromised. It's a small chance but it can happen.

I can't convince you. I only hope that people start seeing the need for it and begin reading the documentation to see its strengths

[-] Findmysec@infosec.pub 9 points 4 days ago

I2P is P2P, TOR is not. That is the gist of the matter

[-] Findmysec@infosec.pub 12 points 4 days ago

Install Gentoo on her MacBook

view more: ‹ prev next ›

Findmysec

joined 2 months ago