• zr0@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    21
    ·
    14 hours ago

    Are there any known cases, where operators of trackers got convicted? Talking about trackers only, not the possibility to download the torrent file

    • truxnell@aussie.zone
      link
      fedilink
      English
      arrow-up
      6
      ·
      13 hours ago

      Piratebay springs to mind. Having trouble finding sources for other outcomes. Oink admins got tried and got off, what.CD staff managed to dissapear into the ether.

        • adr1an@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          39 minutes ago

          TPB is still around, only magnet links are around. They were hosting torrent files which is basically a list of trackers. That’s what they had to drop, in order to continue functioning. And their DNS is still banned like from almost every westernized country.

          Regardless of technicalities, they were #1 biggest player. (Today they are like #3 or #5?) What I mean to say, is that they got busted mainly because of this. To make an example.

  • JRaccoon@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    15
    ·
    14 hours ago

    What if a bad actor acquires one of these once popular tracker domains? Could they somehow take advantage of it? For example, what if they make the tracker advertise a large number of “fake” peers that serve malware instead of the actual files? I only have a crude understanding of how BitTorrent works, so I’m not sure what kinds of protections, if any, it has against this type of attack.

    • TwilightKiddy@programming.dev
      link
      fedilink
      English
      arrow-up
      9
      ·
      edit-2
      6 hours ago

      BitTorrent breaks your data in blocks, each block is hashed, their sizes are known. Assuming you got your .torrent file from a legitimate source, it’s practically impossible to receive something else, as long as your client does all the checks properly.

      In theory, it is possible to write malware that will collide hashes with some other content, but considering you are restricted to the size of the actual content, it’s extremely unlikely that out of all the millions of .torrents we created so far we can find even one for which it is possible.

      And even if you win this absolutely bizzare lottery, you’ll be competing with legitimate peers for serving the blocks. If at least one block that you care about is not served by you, the recepient will just get corrupted content that won’t be dangerous in any way. In other words, you need to have so much bandwidth, that you serve everything before anyone else can serve even one significant block. At which point you will probably have to spend a lot more money on that than you’ll ever get from whatever malware you are trying to serve.

    • pipe01@programming.dev
      link
      fedilink
      English
      arrow-up
      32
      ·
      14 hours ago

      The torrent’s id is, among other things, the hash of its contents so it’s impossible to serve different data

    • Faceman🇦🇺@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      5
      ·
      12 hours ago

      the most I think you could do would be log IPs for malicious or litigious purposes, I don’t think you could really do anything like malware injection in this case.

    • truxnell@aussie.zone
      link
      fedilink
      English
      arrow-up
      8
      ·
      13 hours ago

      MPAA and other rights holders would be able to get list of ips for lawsuits en masse.