Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm surprised there aren't torrent trackers that run on Tor available (or maybe I just haven't heard of them). Seems like it would be a perfect way to avoid both shutdown and the service's ability to identify its users. Am I missing something?


TPB has an .onion site.

But the real danger with torrents is when you're actually sharing the data. Any of the IPs you connect to could be a malicious peer who will later track down your IP through legal channels and send you abusive notices.

I guess the way to protect yourself there is to torrent only over a VPN or through a seedbox.


End game then is VPN providers get sued for piracy. So people use VPN providers in uncooperative jurisdictions. Then VPNs eventually get coopted into sharing user information as IP owners invest more over time in copyright enforcement.


Yes, VPNs (or even Tor) can only work till a limit. Any technical solution can always be legislated as illegal and solved. So the real dispute is political and will be won or lost there. Right now though except in some places, ordinary masses are loath to be politically active or informed, and this suits the few in power very well.


Yup. I use ProtonVPN on account of its Swiss jurisdiction and no-logs policy.

It’s not perfect, but puts up enough obstacles for me to feel better about it than some fly-by-night VPN


> Yup. I use ProtonVPN on account of its Swiss jurisdiction and no-logs policy.

Can switzerland even be considered "non-cooperative"? I mean, most people probably think so because of their reputation as a an "offshore bank", but that's been eroded due to the passing of FATCA.


Switzerland is interesting from a copyright aspect in multiple ways:

- Downloading copyrighted material, even from obviously shady sources, is perfectly legal.

- Sharing said material with your friends, even if you obtained it from an obviously shady source, is perfectly legal.

- Sharing it with random strangers (as happens while torrenting) is not legal, but hard to prosecute, because:

- private companies collecting IP addresses to sue uploaders violate privacy laws, and thus commit a crime themselves (!) [1]

I didn't check, but I'd also assume:

- That ISPs and VPN providers aren't required (and quite likely even aren't allowed) to disclose the identity behind an IP address to a private entity

- That VPN providers (unlike ISPs) aren't required to maintain such logs, and thus typically don't.

For comparison, in Germany, downloading from "obviously illegal" sources is prohibited, further sharing a copy from such sources among friends is prohibited (and since breaking copy protection is prohibited too, having a DRM-free copy of the content is a pretty strong indicator that it comes from an illegal source - unless you got it from a Swiss friend...).

[1] https://www.weka.ch/themen/it-technik/it-sicherheit-und-rech...


You can torrent over i2p in order to not leak your ip.


Yep, I'm gonna give a second request for what i2p is? Seems to be similar to tor? Can someone explain the differences? (Sorry for what might be a very elementary question)



What’s i2p all about then? I took a look at the website and I’m none the wiser. Is it something like Tor?



I’m still not getting it.

Is there a single i2p universe or do you have separate self hosted instances. What does i2p offer that Tor doesn’t? Are there active sites or communities it is it just a routing layer?


Considering a tracker's job is to serve up connectable IPs then I'm not sure what the point is other than hiding the tracker's location.


It makes more sense in the context of a larger hypothetical infrastructure. If BitTorrent clients also had the option to publish their open port as a Tor hidden service, then they could register with a tracker that's also a hidden service, entirely over Tor; and then use the tracker to discover the Tor hidden-service addresses of other BitTorrent clients to connect to.

You could also run the BitTorrent Kademlia DHT on top of Tor, without any explicit tracker needed; just with Tor hidden-service BitTorrent client nodes publishing the hidden-service addresses of other client nodes to the DHT ring.

(I often wish that the Tor overlay network was IPv6-based; then "hidden-service addresses" could just be IPv6 addresses in a particular IPv6 public subnet, reserved to represent the Tor overlay network. Then client software wouldn't need to know anything about Tor in order to take advantage; making a client "only operate over Tor" would just be a matter of giving the client an IPv6 subnet mask to restrict what it was willing to connect to; or putting it in a network namespace that was so-restricted.)


I have toyed with DHTs successfully over Tor and it works work fine, but that's just peer discovery. If large data transfer doesn't go over Tor, you're still exposing your IP. If large data transfer does go over Tor you're potentially harming the network (even if it's just to onion service) by over using relays (and Tor actively discouraged BT use over the network). There are alternatives like Tribbler, but none popular enough.

Also onion service v3 addresses, which are entire ed25519 public keys, won't fit in an ipv6 address (haven't checked base 32/36/whatever for v2 onion addresses, but surely also won't fit in, say, a /64).


If the tracker itself is also on Tor, you don't need exit nodes, which are probably the most limited resource in the Tor design due to the legal challenges of running an exit node. And while normal Tor clients use a 3-layer design, a reduced number of layers might be good enough for torrent users. If the torrent client participates in the tor network, that would also help.


does tor’s problem with large amounts of data stem from a lack of operators or the nature of tor itself?


I believe a bit of both. I'm no expert on it, so my response here may not be completely accurate.

Tor relays, while more numerous than exit nodes, are still limited (we're discussing a custom onion service communication setup here, not using Tor for general purpose BT which would use exit nodes). Anyone can run one, and please do so if you have good bandwidth each way. Relays are opt in because not only does it open you up to lots of bandwidth usage, but Tor shouldn't default to running a relay for those that may be philosophically opposed. Relays pass all data through anonymously and encrypted, but some still may not feel comfortable doing it. So there are limited operators.

As for the nature of Tor itself, to keep both the client and onion service operator anonymous, they communicate through a rendezvous which means a Tor circuit for each side (each Tor circuit is 3 hops iirc). And geographic distance is intentionally disregarded, so it may traverse the world multiple times over.

I have considered running a private Tor network with directory servers replaced with a DHT, forcing everyone to be a relay, and then essentially running a private BT over that, but it'd need significant adoption to be viable. Also, there may be Tor limitations in huge numbers of relays (and definitely issues with slow relays), I haven't checked. Finally, in addition to traffic analysis attacks that always exist, it is believed iirc lately that federal agencies are sitting on Tor exploits (granted may only be for exits and/or Tor browser).


wow this is pretty ingenious. the only problem is that i think tor has traditionally been a low-bandwidth network?




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: