professa X Posted September 7, 2014 Report Share Posted September 7, 2014 So i'm thinking about using tribler. The use a pretty unique method for downloading torrents. They implement a subset of Tor but not entirely. I was wondering if anyone had used it yet. currently i use the bloated utorrent but wanna achieve for anonymity. I think PeerBlock + Tribler is pretty close to anonymous with our a vpn? What say you? http://torrentfreak.com/tribler-makes-bittorrent-client-anonymous-built-tor-network-140902/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Torrentfreak+%28Torrentfreak%29 Quote Link to comment Share on other sites More sharing options...
JohnFlower Posted September 8, 2014 Report Share Posted September 8, 2014 I hope 'the first proxy' is a secure node. If it's just a regular peer, the whole 'secure' thing goes out the window. Quote Link to comment Share on other sites More sharing options...
Moodkiller Posted September 8, 2014 Report Share Posted September 8, 2014 (edited) @JFSupposedly it is according to this from the website: The first proxy layer encrypts the data for you and each next proxy adds another layer of encryption... But then this was mentioned:Proxies no longer need to be fully trusted. A single bad proxy can not see exactly what is going on @professaAs far as peerblock goes, I gave been running it the past few weeks and I am surprised how many IP's it 'blocks'. I say 'blocks' because the programme is just comparing the IP's accessing your PC to a database of blacklisted addresses, majority of these peers could easily change their IP and thus have access to your torrents again - jdownloader even supports this option and with its automatic script maker, I can now change my IP address whenever I want to/file host limits my downloads. Edit: layout Edited September 8, 2014 by Moodkiller Quote Link to comment Share on other sites More sharing options...
SenshiKeizu Posted September 8, 2014 Report Share Posted September 8, 2014 Does this thing actually work? Quote Link to comment Share on other sites More sharing options...
professa X Posted September 8, 2014 Author Report Share Posted September 8, 2014 Yea the current download does a 50MB download through that network for statistical purposes. Next month it rolls out. It was featured in TF. Quote Link to comment Share on other sites More sharing options...
JohnFlower Posted September 9, 2014 Report Share Posted September 9, 2014 Moodkiller, that's the point. Apparently the data isn't encrypted until it reaches the first proxy. That seems dumb. Quote Link to comment Share on other sites More sharing options...
Moodkiller Posted September 9, 2014 Report Share Posted September 9, 2014 (edited) Moodkiller, that's the point. Apparently the data isn't encrypted until it reaches the first proxy. That seems dumb. Ah I thought you were referring to the actually proxy 1 itself and not the path to it. Then yeah, that would probably be an issue as who knows where that first proxy actually is and any number of people could 'listen' in to what you are sending... Edited September 11, 2014 by Moodkiller Quote Link to comment Share on other sites More sharing options...
professa X Posted September 9, 2014 Author Report Share Posted September 9, 2014 But don't we have encrypted protocols? Idk if triller uses it but if we merge the two plus peer block then we're solid correct? Any who I'm assuming that these are encrypted tunnels to the proxies like in vpn's. Because how else are u achieving anonymity . Quote Link to comment Share on other sites More sharing options...
Moodkiller Posted September 10, 2014 Report Share Posted September 10, 2014 But don't we have encrypted protocols? Idk if triller uses it but if we merge the two plus peer block then we're solid correct? Any who I'm assuming that these are encrypted tunnels to the proxies like in vpn's. Because how else are u achieving anonymity . To further strengthen your point, there is this one line: You are the only one who can decrypt these three layers correctly. Which to me would imply that even though the tunnels specifically my not be encrypted, the data traveling through them has already been encrypted three times so it would be useless to someone listening to the traffic unless they get the decryption key. Quote Link to comment Share on other sites More sharing options...
professa X Posted September 11, 2014 Author Report Share Posted September 11, 2014 But don't we have encrypted protocols? Idk if triller uses it but if we merge the two plus peer block then we're solid correct? Any who I'm assuming that these are encrypted tunnels to the proxies like in vpn's. Because how else are u achieving anonymity . To further strengthen your point, there is this one line: You are the only one who can decrypt these three layers correctly. Which to me would imply that even though the tunnels specifically my not be encrypted, the data traveling through them has already been encrypted three times so it would be useless to someone listening to the traffic unless they get the decryption key. I concur. But isnt an encrytped tunnel just that a connection where data is encrypted between the two users? Quote Link to comment Share on other sites More sharing options...
Moodkiller Posted September 11, 2014 Report Share Posted September 11, 2014 I concur. But isnt an encrytped tunnel just that a connection where data is encrypted between the two users? I would say it is... I was just assuming that the tunnels may not be encrypted in this case seen as you have those proxy nodes doing the encryption... under normal circumstances, what you said above would be correct. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.