this post was submitted on 30 Jun 2025
695 points (99.3% liked)

Technology

72354 readers
2809 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 17 points 2 days ago

See you guys in I2P :)

[–] [email protected] 15 points 2 days ago* (last edited 2 days ago) (1 children)

ha. all of my traffic is encrypted and routed through at least 3 pirate friendly countries and servers that don't keep logs. good fucking luck inspecting those packets.

[–] [email protected] 18 points 3 days ago (1 children)

Always make sure that QBT uses your VPN's network interface. I got some DMCA emails despite split-tunneling a VPN recently, and I realized it was bound to all interfaces by default - that's no good.

[–] [email protected] 1 points 2 days ago (1 children)

Better to just configure a firewall properly so that no packets can go outside of the vpn tunnel.

[–] [email protected] 1 points 2 days ago (1 children)

How is that better? If you configure your firewall rules incorrectly, this protects you against that. This ensures you have no connection if your VPN isn't on/isn't working.

[–] [email protected] 1 points 23 hours ago

Thats what the firewall rules do too, don't allow internet connection if there's no vpn connection.

Firewall is a system-wide solution that always works, while qbt config relies heavily on the application implementing interface binding properly. Which it doesn't fully btw.

[–] [email protected] 30 points 3 days ago

Then pirates will just get smarter. No way for them to see who is watching all of these movies with their VPN and Debrid service.

[–] [email protected] 26 points 3 days ago (2 children)

Lol.

Do ISPs like making money?

Then they shouldn't disconnect users who pirate.

I get notifications from my ISP all the time. They don't do anything though because they like the money I give them.

[–] [email protected] 5 points 2 days ago* (last edited 2 days ago) (1 children)

I've been torrenting movies and software since 2000, no vpn, like I literally have torrented damn near everything I've watched for decades and have only gotten a notice once and it wasn't even me. It was from a temporary roommate who had watched a movie on a pirate streaming site.

So that tells you how good and accurate their detection techniques are.

[–] [email protected] 8 points 2 days ago (1 children)

Their methods are fine, they literally just pirate the stuff themselves, see which IPs connect to them, then connect those to an ISP and notify them. The main reasons you wouldn't get notices are getting lucky, not seeding much, not torrenting things that are being monitored, or having an ISP that doesn't care much.

The single notice from the streaming site makes sense, pirate streaming sites are usually honeypots or heavily monitored.

[–] [email protected] 1 points 2 days ago* (last edited 2 days ago) (1 children)

My routine is always use piratebay, never use a pirate streaming site, no new or big studio releases, no porn, not seeding for long and choosing less active torrents. I can't say much for how effective it is since I've never gotten hit so I can't really experiment (I've had five or six ISPs in two different countries).

they literally just pirate the stuff themselves, see which IPs connect to them, then connect those to an ISP and notify them.

And I don't even understand how this would hold up if it ever went to trial. How can an IP owner "pirate" their own IP? Even when they outsource it to services who do this they're still giving permission for the IP to be distributed.

It's like hiring someone to "steal" your own TV, putting it in a back alley and then accusing whoever takes it of being a thief.

[–] [email protected] 1 points 2 days ago* (last edited 2 days ago)

It's generally seen as okay on a similar level to undercover work. They do it for Investigation reasons, the torrent was already uploaded before they joined, their monitoring serves a legitimate law enforcement purpose, and they're authorized by the copyright holder (themselves) to do it. They didn't put the movie or whatever out there themselves.

[–] [email protected] 6 points 3 days ago

After switching to torbrowser for all my questionable searches and downloads, I no longer get notices from my ISP for like 10 years now

[–] [email protected] 3 points 3 days ago

According to the article this is the USA. How on brand.

[–] [email protected] 33 points 3 days ago

let's all fall on our sword to make sure Disney never loses a potential subscriber for Marvel Wars. Truly, we are defending the interests of the people here

[–] [email protected] 7 points 3 days ago

Life depends more on accessing things online. This would just be punishing people beyond the scope of the case against people.

[–] [email protected] 45 points 3 days ago

All public wifi will be disconnected pretty quickly.

[–] [email protected] 60 points 3 days ago (2 children)

This is how you get a new darknet.

[–] [email protected] 13 points 3 days ago (3 children)

In Germany and no doubt some other countries, private law firms can (on behalf of the copyright holders) request people's identity based on residential IP addresses and then send extortionist legal threats. Apparently an IP appearing on a public tracker can be enough to trigger it, without any confirmed data transfer.

VPNs are common and usually sufficient.

[–] [email protected] 3 points 2 days ago

they try that in the US, using mass litigation, but it doesnt work, its usually designed to scare indivudal IP users to "turn them self in"

[–] [email protected] 2 points 2 days ago

A boy downloaded a movie via torrent without using a VPN.

He died.

Good night! 😴

[–] [email protected] 3 points 2 days ago (1 children)

Don't public trackers add random IPs?

[–] [email protected] 4 points 2 days ago

They could. The protocol also supports IP spoofing, so doxing could also be a thing.

For individuals, it is a time consuming and costly legal process, whether justified or not. For the law firm, it costs a few cents per letter, but they get a few hundred (or more) euros when some sucker pays.

[–] [email protected] 18 points 3 days ago

Yep there is no way they can block I2P, they have to block all of it.

load more comments
view more: next ›