this post was submitted on 13 Sep 2024
545 points (95.8% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54318 readers
470 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 1 month ago (2 children)

Yes, a hosted seedbox paid with crypto and self managed keys is the way to go for torrenting

[–] [email protected] 12 points 1 month ago (2 children)

If you are worried about VPN's, why are you not worried about seedbox providers?

[–] [email protected] 1 points 1 month ago (1 children)

As he said, paid with crypto and managed with his own keys. I don't see how the seedbox provider can trace you if you do that, so there's not that much to worry about

[–] [email protected] 2 points 1 month ago (1 children)

You're going to connect to the seedbox at some point, which ties your IP to the traffic. If you are worried about a VPN attaching your IP to traffic, this is no different, no?

[–] [email protected] 0 points 1 month ago* (last edited 1 month ago)

SFTP over TOR. This should be a requirement at this point.

If you're not doing that, then yes you're technically right in that seedbox companies can be subpoenaed too. I usually use TOR to copy over what little I torrent.

[–] [email protected] -1 points 1 month ago (1 children)

I am not worried about my torrenting traffic. I am worried about installing their software on my machine and giving them wide access including port mirroring.

[–] [email protected] 1 points 1 month ago

if you can't connect to a vpn using only open source software, that's a crappy vpn

[–] [email protected] 5 points 1 month ago (2 children)

What evidence do you have that no-log VPNs are compromised by the NSA? What about VPNs based in other countries like Canada?

[–] [email protected] 3 points 1 month ago* (last edited 1 month ago) (1 children)

the US has so much geopolitical reach that companies in canada or elsewhere would just hand over the question if it was high enough profile.

[–] [email protected] 4 points 1 month ago (1 children)

That's an interesting point, but I think the "if it's high profile enough" is key. People torrenting files is probably low on their priorities. On the other hand, somebody organizing a terrorist cell is probably much higher.

Companies might have an interest in finding pirates, but it would not be as easy for them to get other companies to comply with their subpoenas.

[–] [email protected] 4 points 1 month ago

yeah if ur just a dude pirating, it probably doesn't matter, but if they find you've done a large crime, you can bet your ass that shits getting yoinked from you.

companies might, but that's almost entirely through legal processes. ceast and desists, required reporting, etc...

[–] [email protected] -5 points 1 month ago (3 children)

You might have heard about Edward Snowden? Have you looked into anything that he leaked?

[–] [email protected] 13 points 1 month ago (1 children)

The existence of the NSA and their activities is not proof that they have backdoors in VPNs. That's bogeyman conspiracy theory shit—"they could be anywhere, therefore they're everywhere!"

You still haven't answered the question, and I'm beginning to think you are making shit up based on paranoia.

[–] [email protected] -4 points 1 month ago* (last edited 1 month ago) (1 children)

Go ahead and use these services. I don't care about you, what you do or what you think. You are deeply unserious if you are not paranoid about the surveillance and I really have nothing to discuss with you.

[–] [email protected] 7 points 1 month ago (1 children)

Is there literally any evidence that the US government managed to extract useful information from no-log vpn providers in the US?

[–] [email protected] 2 points 1 month ago

I have (anecdotal) evidence that they, in fact, can't extract useful information from one particular no-log vpn provider in the US, PIA. They showed up to seize data, but walked away empty-handed when they found out that they are, truly, no-log and their servers run entirely from RAM, so no drives to extract data from.

[–] [email protected] 8 points 1 month ago* (last edited 1 month ago) (1 children)

You didn't answer the question. Your behavior is toxic.

[–] [email protected] -5 points 1 month ago

My behavior is toxic because I am saying VPN services aren't safe? OK whatever. I really don't care what the fuck you do. Go ahead and pay money for these services 🤷‍♀️

[–] [email protected] 1 points 1 month ago

Is your home machine, your phone, better protected than the VPN servers? I bet you're not as good at IT security as the IT security staff VPN companies hire

If your threat model includes nation state actors, you're best off not using networked computers