Hacker News new | past | comments | ask | show | jobs | submit login

For UK Visitors:

The Pirate Cloud

So, first we ditched the trackers.

Then we got rid of the torrents.

Now? Now we've gotten rid of the servers. Slowly and steadily we are getting rid of our earthly form and ascending into the next stage, the cloud.

The cloud, or Brahman as the hindus call it, is the All, surrounding everything. It is everywhere; immaterial, yet very real.

If there is data, there is The Pirate Bay.

Our data flows around in thousands of clouds, in deeply encrypted forms, ready to be used when necessary. Earth bound nodes that transform the data are as deeply encrypted and reboot into a deadlock if not used for 8 hours.

All attempts to attack The Pirate Bay from now on is an attack on everything and nothing. The site that you're at will still be here, for as long as we want it to. Only in a higher form of being. A reality to us. A ghost to those who wish to harm us.

Adapt or be forever forgotten beneath the veils of maya.




Also, the UK Pirate Party has a "cloud" mirror of TPB:

https://tpb.pirateparty.org.uk/

And there is a Tor hidden service for it as well, which can not be taken down unless Tor it's self is taken down:

http://jntlesnev5o7zysa.onion/

And for those who want to use Tor hidden services, but don't have Tor installed:

https://jntlesnev5o7zysa.tor2web.org/


A note to those using Tor, though. Getting your .torrent files and magnet links over Tor is fine, but please don't route your P2P traffic over Tor. Bittorrent wasn't designed for anonymity, so you'll be sending all sorts of data that makes it possible to identify you anyway, but, more importantly, it makes the Tor network slow as hell.


To add some detail to your claim: Some clients use UDP and write the IP address into the body of the message.

https://blog.torproject.org/blog/bittorrent-over-tor-isnt-go...


Yeah, if you're going to use Bittorrent over Tor, you have to assume that the Bittorrent client will leak everything it knows about you, and therefore work to make sure it knows nothing about you.

If you're using a Linux box, you can use iptables to force all TCP traffic through Tor, dropping everything else. Then make sure the box doesn't know it's "public" IP address, only it's NAT'ed one. Even if it does a call out to something like http://whatismyip.com/ in order to determine it's external IP address, it wont get the real one because that traffic will have been forced out through Tor.

See: https://trac.torproject.org/projects/tor/wiki/doc/Transparen...

Speed wise, Tor appears to be slow, but that is just latency. For throughput it's fine. Especially if you're connecting to lots of different hosts over lots of different Tor circuits, as happens with Bittorrent.

But yes, the Tor Project doesn't want you to be using Bittorrent over Tor.


Every packet passing to Tor is passed through a few hosts, this effectiviely multiplies the traffic, so with your throughput you'll be hogging everyone out.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: