this post was submitted on 11 Nov 2023
32 points (64.8% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54577 readers
263 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

If piracy is moral and ethical and enables us to share knowledge, why do private trackers gatekeep this knowledge? It goes against the principles of piracy. Do they do it just to feel superior about bring in a sekrit club?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 1 year ago (6 children)

I'm curious, I thought with DHT the hash of the file would suffice?

[–] [email protected] 1 points 1 year ago (5 children)

easy for the malicious to spoof...

[–] [email protected] 1 points 1 year ago (4 children)

What do you mean? Are you talking about the hash being spoofed?

[–] [email protected] -1 points 1 year ago (1 children)

It's fairly trivial to craft a dummy file that has the same hash as any given file, the chance of that happening randomly is infinitesimal, hence the usefulness of hashing, but it has been done in the past as a way to poison torrents.

[–] [email protected] 4 points 1 year ago (1 children)

This is FUD. There is no publicly known pre-image attack against SHA1, the hash used in mainline DHT.

[–] [email protected] 1 points 1 year ago (1 children)

Huh, there has been a detected SHA1 hash collision in 2017. But unless your malicious actor is the NSA it’s unlikely they would be able to crack the hash

https://shattered.io/

[–] [email protected] 2 points 1 year ago

Collision, not pre-image attack (the two are different)

load more comments (2 replies)
load more comments (2 replies)
load more comments (2 replies)