• 49 Posts
  • 278 Comments
Joined 3 months ago
cake
Cake day: November 22nd, 2025

help-circle


  • What I did, what I do and why I do it

    At the beginning of the 2000’s, piracy either wasn’t as prevalent as it is today or it wasn’t as persecuted, or a combination thereof. Which is to say, I started with DC++, Kazaa and direct downloads. No security or privacy measures. This is also when I proudly downloaded the first Pokémon movie Pokémon: The First Movie (1998), sat down with my parents to watch it and then immediately having to explain to them why Pokémon are having sex. Suffice it to say, it was some Pokémon themed hentai.

    As my understanding of computers, networking and capitalism evolved - this being around the early 2010’s - and especially as I had learned about the improved, albeit not perfect, anonymity of torrenting in a society with otherwise increasingly oppressive demeanor towards online integrity and piracy -, I decided to only pirate using torrent clients thenceforth. I also took a brief pause from piracy for about six years, as I moved to a jurisdiction whose laws and attitude towards privacy were not known to me. I was doing my Master’s degree and thus couldn’t spare the time and effort it would’ve taken to safely engage in piracy.

    As we arrive to present day - present time (any fans here?) -, nation states’ attitude towards piracy - or, rather the lobbyists’ relentless pursuit to reap legal fees - but really just the overall cyber climate with all the data brokers indiscriminately collecting, profiling and selling our data to the highest bidder, I simply don’t dare to be on the clearnet/internet without using a VPN, an adblocker and DNS/hosts file based filtering anymore. I would argue that the risks to the integrity of the individual is great enough to warrant these countermeasures regardless of jurisdiction, but I digress. Sure, if your jurisdiction does not criminalize piracy, be my guest, torrent without a VPN.

    My current setup

    A few notes on Mullvad:

    • I am using Mullvad VPN on a router so that all my traffic is encrypted, but their desktop app is also good - better in regards to customizability -, just make sure to bind your torrent client to the network interface created by the VPN app.
    • You cannot make applications reachable from the internet (aka forward ports) with Mullvad. You can still download, but you are a passive seeder, only reachable by peers that do have port forwarding enabled. (Note: a great majority of the bigger seeders/public seeding groups use so called seeding boxes whose ports are forwarded and I seed in average 8TBs per month with steady share ratios of around 8.0, so don’t let this discourage you, unless maximizing your seeding contributions is what is most important to you.)

    Paying nothing

    As others have already pointed out, double check what laws apply in your specific jurisdiction before pirating unprotected. I haven’t tried it myself, except for running two of their routers to contribute bandwidth, but file sharing in the closed network i2p is supposedly popular. However, I can neither confirm nor deny this and it is a somewhat more technical approach. All your traffic is encrypted many times over and what you do inside i2p is not visible from the clearnet. https://geti2p.net/en/









  • Matter of perspective. Earlier today, I told a coworker how happy I am to have been born in the late 1980’s, because it spared me from the internet culture of today: shallow, exploitative, otherizing and it encourages short term dopamine kicks. It’s a breeding ground for media illiteracy, bigotry, xenophobia and narrow mindedness in general - which is ironic, since it also makes the culminated knowledge of human kind easily accessible, which has the potential to open your mind if you have internet access and if you use the internet wisely. Anyway, in a way, the internet of today is a crystalization of everything that’s making me have a gloomy outlook on the future and keeping me from wanting to have children.
















  • One could cool down system memory before power is cut to a point where it retains in-use plaintext encryption keys. One basically renders the otherwise volatile system memory temporarily nonvolatile. And if one manages to keep the temperatures low for long enough, one could swap those memory modules into one’s own computer/motherboard and print the keys. As you can imagine, the resources needed for this type of attack makes the proposition of it infeasible. Then again, if your adversary is a nation state… Fingers crossed?


  • Very insightful! Are those the speeds that I can cat from /sys/class/net/[interface name]/speed? Assuming you know Linux, that is. Those negotiated speeds, are they hardcoded into the NIC and selected/negotiated based on what category cable I’m using and other such hardware related factors? Also, is there any “wiggle room”? As in, does it do a speed test to check the limits of the physical layer or does it just follow some vendor specifications?