How does this firm (or whatever it is) know I torrented something? My VPN app took a shit in the middle of a download and I think it exposed my IP to some “anti-piracy” bullshit firm that contacted my ISP. ISP emailed to let me know and to “not do it again”. How does this firm know about torrenting? Do they like watch these sites and hope someone’s VPN slips like mine did today?
Bind your torrent client to your VPN interface so that if the VPN loses connection for whatever reason, nothing downloads or uploads via your client.
deleted by creator
I’m using qBittorrent’s web ui, and you get to the setting from Options (cog symbol)->Advanced tab->Network Interface. Figuring out which network interface is the VPN interface depends on your OS.
deleted by creator
Exactly, it will now only be able to access the Internet via that interface even if proton is running but not actually connected.
deleted by creator
Sorry for the delay, just saw this.
So the “pvpnsomthingsomething” is most likely the name of the server you’re connecting to, but if you’re not using the paid tier for Proton it won’t let you select servers that support peer to peer traffic. Sounds like that might be your issue if you’re still getting stalled with that network connection selected.
Also, the killswitch and the ipv6 “networks” that it creates are just there to enforce the killswitch (ie. create a fallback dead-end network device if the VPN goes down) and to catch and dead-end any ipv6 traffic that might be leaking.
deleted by creator
They watch the swarm. You can view connections of the swarm. They see your ISP owned IP and send an email.
deleted by creator
My VPN app took a shit in the middle of a download and I think it exposed my IP to some “anti-piracy” bullshit firm that contacted my ISP.
I think you answered your own question.
deleted by creator
deleted by creator
The same way you can see the ip of your peers on any particular torrent.
deleted by creator
This site is kinda cool
deleted by creator
be careful, sometimes it’s a scam or a cash grab with no legal basis.
deleted by creator
Many places have laws in place currently stating that you can’t be personally identified by your IP. So if you get emails about piracy and copyright issues coming from a law firm representing rightsholders, the best course of action is usually to ignore them. Responding to them is essentially admitting that you’re the person they’re looking for and that you committed the offense in question.
deleted by creator
Look into transmission open VPN docker container. Forces/ensures VPN connection. Easy to setup and configure.
Proton has a very nice article on how to set up torrenting: https://protonvpn.com/support/bittorrent-vpn/
deleted by creator
a killswitch is a must-have in this case then
killswitch doesn’t work because packets can still get through between the time when the VPN goes offline and when it activates, need to bind torrent client to vpn or have some firewall configuration to prevent non-vpn traffic
deleted by creator
I suggest you to deactivate IPv6 also and force the killswitch.
deleted by creator
There are VPN services which leak IPv6 addresses, so it’s better if you disable it and I suggest you to use a private DNS service also.
So disable IPv6, force killswitch and implement secure DNS, you should be fine with that.
deleted by creator
Good luck!! 👍🤞
deleted by creator
Getting a seedbox is pretty easy and generally cheap too.
You might want to cross post to !piracy@lemmy.dbzer0.com
I’ve heard they monitor the torrents and try downloading from the peers as evidence of them distributing the content.
Anyway, you could set up firewall rules to only allow connections via VPN interface (and out to the VPN server, of course).
deleted by creator
Oof, sorry. This will depend on OS and the software you use for FW configs. I am too dumb.
For example, I use UFW on Linux. So for me it’s
# Deny all incoming and outgoing traffic by default ufw default deny outgoing ufw default deny incoming # Allow connection to VPN server ufw allow out to <VPN server IP address> [port] <VPN server port number> [proto] <tcp|udp> # Allow connection via VPN interface ufw allow out on <interface name> from any to any # Enable UFW ufw enable
That’s just one simple way.
deleted by creator
I am not sure I understand your comment.
Blocking outgoing traffic blocks all outgoing traffic, thus including traffic outside of VPN.
Allowing outgoing connections to the VPN server simply makes an exception in that blocking, otherwise you couldn’t even connect to a VPN.
Swap provider(just for the doubts) and implement a good way of killswitching it… good luck!!