440
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 28 Dec 2024
440 points (99.1% liked)
Technology
60212 readers
3363 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
You can't even truly read what's inside of an SSL packet. They probably want to fuck with the routes around torrent trackers.
There are always ways around, tor, retro share, i2p. I kind of wish we'd find a harder to track version of torrent.
Torrents are already very hard to block. You don't actually need a tracker, because all modern torrent clients support DHT (distributed hash table). You only need some way to get the initial hash for a torrent, so that's where trackers are still useful, but once you're connected to the swarm, you can only be blocked if the entire swarm is blocked.
Tracking though... It's too easy to get IP addresses for the entire swarm and I don't see how you could ever fix that. Tor doesn't really solve that issue either, it just moves it to places where you won't get in legal trouble or to people who don't mind getting in legal trouble, a bit like VPN providers.
I wonder what the legality would be of seeding the binary difference between the wikipedia.zim and a copy of the wild robot. But I digress... We could probably bolt on something I2P like to torrent, have everything pass through multiple nodes. I fear the best we could ever work out would be plausible deniability.