this post was submitted on 01 May 2024
112 points (98.3% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54500 readers
732 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

I honestly don't believe I will have any legal trouble because I don't do anything like cp or worse, I just pirate media I like, not even porn. But across users of communities, or on public trackers, is IP exposure something to be concerned about?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 6 months ago (1 children)

You still need someone else's computer. Making a cloudflare proxie or other cloud platform is useless and not secure, specially if you're torrenting or trying to hide your IP.

I'm pratically sure they even block the torrent protocol and do not allow port forwarding on most cloud VPS.

Yeah proxies are great, but only if you have somewhere to route your traffic.

[–] [email protected] 1 points 6 months ago* (last edited 6 months ago) (1 children)

A proxy is no less secure than a VPN, assuming it's using encryption like TLS. It's not as good for torrents since you can't port forward, but fundamentally people that use commercial VPNs are using then just like a proxy. Some providers like NordVPN do offer HTTPS proxies in addition to their VPN service.

[–] [email protected] 1 points 6 months ago (2 children)

A proxy operates on the application level; a VPN on the OS level. Both the VPN and the proxy are susceptible to OS-level threats. The proxy is also susceptible to application-level threats that the VPN is not. A misconfigured or exploited torrent client, for example, could ignore the proxy and expose your public IP. With a properly functioning VPN, that faulty application can only expose the public-facing end of the VPN tunnel.

[–] [email protected] 1 points 6 months ago

A VPN can also have a faulty config. Everything depends on correct configs :)

[–] [email protected] 1 points 6 months ago* (last edited 6 months ago)

The proxy is also susceptible to application-level threats that the VPN is not.

You sure about that? I mean, to use a VPN your need some kind of application that could potentially be vulnerable or have some zero day exploits.

In contrary, a proxy is as simple as to forward your traffic to another computer through a SSH tunnel which doesn't specially need some kind of application but only relies on lower level package.

Maybe I misunderstood your comment but If I'm wrong I'm agear to learn something new.