<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; private-tracker</title>
	<atom:link href="https://torrentfreak.com/tag/private-tracker/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 19:18:38 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Trading &amp; Selling Torrent Site Invites &#8211; Public Service or Outright Menace?</title>
		<link>https://torrentfreak.com/trading-sellling-torrent-site-invites-public-service-or-outright-menace-131110/</link>
		<comments>https://torrentfreak.com/trading-sellling-torrent-site-invites-public-service-or-outright-menace-131110/#comments</comments>
		<pubDate>Sun, 10 Nov 2013 11:43:34 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[Opinion]]></category>
		<category><![CDATA[private-tracker]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=79304</guid>
		<description><![CDATA[Access to private torrent sites can only usually be achieved by obtaining a personal invitation from someone who is already a member. However, there are ways to short-circuit the process, such as buying an invite from a seller or doing a trade. Do these routes amount to a public service, or do traders and sellers undermine tracker security to the detriment of all?<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/private.jpg"><img src="http://torrentfreak.com/images/private.jpg" alt="private" width="180" height="120" class="alignright size-full wp-image-75301"></a>Very generally there are three types of torrent site, each requiring a different level of commitment from the user.</p>
<p>First there are the no-signup required types that give free access to all of their features with no commitment required by the end user. Next there are the free to access sites that also offer additional features if the user is prepared to sign up with an email address. Finally we have private torrent sites that have all of their features behind a subscription wall. </p>
<p>Gaining access to this latter category can vary from a fairly simple process to an almost impossible one. Some private sites let new members sign up via an ordinary page with no additional restrictions but many operate an invite-only regime and are very strict about who should obtain them.</p>
<h2>The first hurdle, trading and cash</h2>
<p>Herein lies the problem. If a user wants access to BestTrackerInTheWorld.com he needs to have an online buddy already on the site with invites to spare &#8211;  if he doesn&#8217;t then he can&#8217;t get in. However, there are ways for people to obtain invites without having any &#8216;real&#8217; friends at all.</p>
<p>Firstly, there are sites around where people in possession of invites to site X are able to trade them with people who have invites to site Y. By sharing in this fashion a user with access to a couple of sites&#8217; invites can find himself with double or triple the amount, if he plays the game cautiously.</p>
<p>This activity is strictly against the rules of many private trackers but that doesn&#8217;t stop those wishing to trade. Many traders build up vast collections of invites which are not only valuable in terms of the access they provide, but in a real monetary way too. And when there&#8217;s cash on the table, getting access to that all-important first invite isn&#8217;t hard at all.</p>
<p>There are plenty of places online where people can buy an invitation to a low-end private tracker for just a few bucks. Furthermore, those with deep pockets should have no problems gaining access to even the most exclusive private trackers, providing the price is right.</p>
<h2>Trading scum</h2>
<p><a href="http://torrentfreak.com/images/danger.jpg"><img src="http://torrentfreak.com/images/danger-150x150.jpg" alt="danger" width="150" height="150" class="alignright size-thumbnail wp-image-51238"></a>At this point many admins, moderators, staffers and users of private torrent sites will be screaming at the screen. Trading and selling invites is almost always completely banned on invite-only sites and those who participate in either activity are often viewed as the lowest of the low.</p>
<p>&#8220;These scum put our security in jeopardy,&#8221; a moderator of one site told TorrentFreak.</p>
<p>&#8220;Any anti-piracy company can buy an invite and put the whole site at risk. We don&#8217;t want traders on the tracker and them being there undermines our work.&#8221;</p>
<p>However, trackers do allow members who have proved themselves in some way to give out a few invitations of their own. They are supposed to do this carefully, to people they already trust and only to those who will contribute positively to the site. But how can site operators be sure that&#8217;s going to happen?</p>
<p>&#8220;Well if they screw up and invite a trader/seller/cheater whatever, they&#8217;re gonna get their account banned aren&#8217;t they?&#8221; a staffer on another site told us.</p>
<p>But just as an anti-piracy company might threaten a file-sharer with prosecution for his transgressions (and be completely ignored of course), invite sellers and traders don&#8217;t follow tracker rules either.</p>
<h2>Getting organized &#8211; trading and selling invites on the web</h2>
<p>One site that aims to drive a bus through the invite wall is <a href="http://torrentinvites.org">TorrentInvites.org</a> (TI). This site and its users give away and sell/trade invites (plus <a href="http://torrentinvites.org/f9/lets-get-party-started-75152/#post363151">other items</a> such as seedboxes) and its operator is only too aware that his work is unappreciated by many private trackers.</p>
<p>&#8220;I know that trackers are calling us scumbags or whatever, because they want users to invite only REAL friends on their sites. But come on&#8230; we&#8217;re in 2013. The power of the net is HUGE and our virtual friends are (unfortunately in my opinion) in many cases more than our real friends,&#8221; he told TorrentFreak.</p>
<p>&#8220;I find it funny that these guys who are breaking federal copyright laws are calling us scumbags, because we are breaking their (shitty in my opinion) anti-trading and anti-selling invites rules.&#8221;</p>
<p>We asked the operator of one private tracker for his opinion of TI and while he didn&#8217;t use the word &#8216;scumbag&#8217; he did get to the point in a four letter word that you rarely hear even in the movies. He also threatened to nuke anyone even slightly associated with the site. However, the admin of TI doesn&#8217;t see his operation as the natural enemy of torrent sites.</p>
<h2>Let&#8217;s be friends</h2>
<p><a href="http://torrentfreak.com/images/friends.jpg"><img src="http://torrentfreak.com/images/friends.jpg" alt="friends" width="180" height="147" class="alignright size-full wp-image-79345"></a>&#8220;We are just giving the chance to many thousands of users to join some good private trackers. To users who are not lucky enough to have real friends to invite them. To users who can prove in the near future that they really deserved this chance,&#8221; TI explains.</p>
<p>While the trackers&#8217; stance is understandable, to his credit TI does put forward what appear to be some logical arguments in support of his operation being of use to trackers.</p>
<p>&#8220;A guy who is willing to pay for an invite is probably the kind of user who is going to donate to a tracker as well. I think it makes sense!&#8221; he says.</p>
<p>&#8220;Another interesting example. Let&#8217;s suppose that an HDBits.org account costs $200. A guy doesn&#8217;t really need his account and he is selling it to another user. Isn&#8217;t it obvious that the new owner needs it more and will make better use of the account than the previous user?</p>
<p>&#8220;What trackers want are good users. Why the hell will they ban this account if they find out<br>
that there was a deal involved? If [the trackers] would let each user to do whatever he likes with his account, after a while they would have the best possible user base.&#8221;</p>
<p>Countering, the retired sysop of another tracker told us that anyone buying invites for large amounts of cash should always be viewed with suspicion as anti-piracy outfits tend to have deep pockets. That may well be, but aren&#8217;t they also just as capable of infiltrating communities, making online &#8216;friends&#8217; and obtaining invites for free?</p>
<p>&#8220;I&#8217;m sure it happens but we wanted to try to reduce the odds,&#8221; he said. &#8220;I don&#8217;t know if it worked or not, all I can say is that it seemed effective at the time. What I hated most was seeing some kid punting our invites all over the place and making good money when we were struggling to pay our server bills.&#8221;</p>
<h2>Trackers sell invites too</h2>
<p><a href="http://torrentfreak.com/images/cash1.jpg"><img src="http://torrentfreak.com/images/cash1.jpg" alt="cash" width="200" height="121" class="alignright size-full wp-image-24443"></a>While the sysop above clearly wasn&#8217;t prepared to step over the line and sell his own invites, there are quite a few sites who are currently doing that.</p>
<p>Visitors to some of the larger private trackers will be aware that while the sites are advertised as full, room can apparently be made for those prepared to donate in return for an invite. However, while not always advertised as blatantly as this, other sites are indeed involved in selling their own invites.</p>
<p>One trader who asked to remain anonymous told TorrentFreak that over the past year he has obtained an official supply of invites from almost a dozen private trackers which he sells and sends back a cut.</p>
<p>&#8220;Some they are wanting me to sell invites only to the best users but others they do not care about it,&#8221; he explains. &#8220;I give them money and they give me invites, beyond that does not concern me.&#8221;</p>
<h2>Selling, trading or giving away &#8211; can security ever be assured?</h2>
<p>TI notes that just because an invite channel is official &#8211; whether that is via the site itself or some other sanctioned source &#8211; it doesn&#8217;t necessarily follow that the quality of new members will be high.</p>
<p>&#8220;Just keep in mind that MANY (bad) users are getting invites in a &#8216;legit&#8217; way, through tracker&#8217;s forums or official recruitment threads [on sites such as Reddit etc] and they are selling/trading these invites,&#8221; he concludes.</p>
<p>The issue of invites is controversial and unlikely to disappear soon. Trackers obviously have an interest in having some sort of control over who gets them when their security is at stake. On the other hand, however, trackers themselves are giving invites to people that they do not personally know yet are asking their members not to follow suit.</p>
<p>In the meantime sites like TI ignore all the rules in order to give the community what they believe it really wants. Who is right? You decide&#8230;</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/trading-sellling-torrent-site-invites-public-service-or-outright-menace-131110/feed/</wfw:commentRss>
		<slash:comments>119</slash:comments>
		</item>
		<item>
		<title>Why Private Torrent Sites Have Strict Copyright Enforcement Rules</title>
		<link>https://torrentfreak.com/why-private-torrent-sites-have-strict-copyright-enforcement-rules-130511/</link>
		<comments>https://torrentfreak.com/why-private-torrent-sites-have-strict-copyright-enforcement-rules-130511/#comments</comments>
		<pubDate>Sat, 11 May 2013 20:14:46 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[private-tracker]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=70208</guid>
		<description><![CDATA[Private torrent sites have a much lower profile than say, The Pirate Bay, but there are hundreds, possibly thousands, of them online, going about their business behind closed, invite-only walls. However, when it comes to providing access to content, private trackers are quite different from their public counterparts. Instead of a Pirate Bay-style free-for-all, access to pirate content is held back by site admins and only unlocked when members contribute to the health of the community.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/lock-fence.jpg" alt="lock-fence" width="200" height="148" class="alignright size-full wp-image-70226">When asked to come up with an example of a torrent site, most tech-savvy Internet users might cite a public and open site such as The Pirate Bay. However, thousands of file-sharers &#8211; many of whom consider themselves to be experts &#8211; might reference a private invite-only site like What.cd.</p>
<p>The argument over which is &#8216;better&#8217; will continue forever, but the differences between private and public sites are clear. Public sites offer content for free on a level playing field. It doesn&#8217;t matter who you are or where you&#8217;re from, you can access the site&#8217;s content for free. There are no barriers to entry and there are no rules.</p>
<p>Generally, private sites first require potential users to obtain an invitation and these vary from fairly easy to extremely difficult to get hold of. Once in, users are expected to play by a set of often very strict rules in order to be granted continued access to content. Screw up and the user is out, and sometimes banned forever.</p>
<p>In short, and as strange as it might sound, to a certain extent operators of private torrent sites implement an intellectual property protection regime to restrict access to content. And according to a <a href="http://www.scribd.com/doc/140796965/Private-Tracker-Enforcement">research paper</a> just published by Bodó Balázs at Budapest University of Technology and Economics, these voluntary IP regimes can go even further.</p>
<p>Balázs begins with a recollection of his attempts to gain an invite to a private tracker via the site&#8217;s IRC channel. He was immediately booted by a bot which explained that his entire country had been banned from the site due to users from Hungary proving bad for the community in the past.</p>
<p>&#8220;I laughed out loud.  In the last few years I got used to the  black  YouTube  screens telling me that &#8216;This video is not available in your country&#8217;, but it was completely unexpected to see that the ‘pirates’ are also locking me out from their musical archives,&#8221; he writes.</p>
<p>Not that Balázs does not appreciate the need for control. He understands that by being closed these sites gain a stability that sites like The Pirate Bay cannot hope to achieve and he recognizes the need for rules in order to maintain a flourishing community.</p>
<p>&#8220;Most of the rules are there to ensure the long-term survival of the common resource pool of shared files in an increasingly hostile legal and technological environment. They also make sure that the collection  is  as  comprehensive as possible and maintains the highest achievable standards in terms of technical quality,&#8221; Balázs explains.</p>
<p>&#8220;Other rules establish internal administrative  hierarchies, decision-making processes and conflict resolution methods:  in other words, they  establish the foundations of a self-governing community.&#8221;</p>
<p>Throughout his paper Balázs references several private sites but redacts their names to protect their privacy. We&#8217;ll continue with his wishes but suffice to say this offers them little extra security &#8211; we recognized the sites immediately from his descriptions. One, a site specializing in non-mainstream movies, told Balázs an interesting story about how they handle copyright issues in order to keep their community healthy.</p>
<p>Rather than a straightforward take-down response to a complaint, the site admin described an interesting negotiation, where the complainant was paid off, not with money, but with &#8216;ratio&#8217;, the main &#8216;currency&#8217; available on a private tracker. Ratio is the comparison between the quantities of data a user downloads versus what he uploads &#8211; the more he does of the latter the more he is allowed to do of the former. Site admins have the ability to manipulate these stats to give users more relaxed access to &#8216;free&#8217; content.</p>
<p>&#8220;Most often the producer will ask for [his content] to be removed until a certain date or until they break even on the film. We have also  ‘paid’  (in ratio) producers to keep their work on the site,&#8221; the admin explained.</p>
<p>Balázs notes that &#8220;backroom dealings&#8221; like these seem to be better received by site operators and provide an avenue for negotiated settlement rather than the alternative of sending in the lawyers. TorrentFreak spoke to the admin of another private tracker specializing in music who confirmed that deals were in place with at least two dozen artists and label workers who agree to keep the peace in exchange for ratio.</p>
<p>With issues over outside influences aside, private tracker rules are put in place to keep the community healthy. Balázs argues these revolve around keeping quality high, maintaining the completeness of the overall library, and keeping the sharing community strong. These factors take priority, even if that means significantly reducing the usefulness of the site to the individual user.</p>
<p>One of the biggest complaints from users on private sites is that they are restricted by ratio rules. While these are necessarily put in place to protect sites&#8217; libraries and quality of service (transfer speeds) for the rest of the community, they also amount to a copy protection system enforced by site admins, which effectively introduces a price for consumption (download) and a price for labor (upload).</p>
<p>&#8220;It is important to note that [private trackers] are not free-markets, and the prices are not automatically defined by supply and demand. On the contrary, prices are set by the not so invisible hands of the site administrators to signal preferred behavior and to address certain shortcomings of the P2P activity,&#8221; Balázs notes.</p>
<p>&#8220;By rewarding the sharing of certain content and penalizing the sharing of  others, such pricing mechanisms are able to ensure that older, less popular, niche, fringe or otherwise archival content stays accessible at all times within the community. By setting download prices to zero [freeleech] these sites play an important role in directing  attention to certain works and authors. Such mechanisms help admins to  ‘curate the collection’  and shape the cultural canon within the network.&#8221;</p>
<p>Content producers are often accused of failing to adjust to the reality that online, content is no longer scarce. The Internet allows infinite digital copies of content to be made at virtually no cost. Balázs writes that while this is the case for open torrent trackers, private trackers counter with the implementation of rules that reintroduce artificial scarcity.</p>
<p>Nevertheless, users of private trackers are generally happy to play by site rules and their admins seem to be more open to deal with rightsholders, even as they break many of the rules laid down in copyright law. Balázs notes, however, that these decisions are less to do with the rule of law and more to do with the code of ethics negotiated within private site communities.</p>
<p>&#8220;As long as the main question of the IP field is not how people can be forced to obey the law, but rather under what conditions they choose to respect  the wishes of authors and  ensure the reproduction of different cultural fields, the survival of different social practices will be a factor of their ethical disposition rather than their legality,&#8221; Balázs writes.</p>
<p>&#8220;In other words we should expect ethically robust practices to persist even if their legality remains in question, and unethical practices will face considerable public opposition even if they are found to be legal.&#8221;</p>
<p>Finally, on the issue of private trackers and their restrictions, Balázs closes with the following thoughts.</p>
<p>&#8220;Voluntary IP restrictions in piratical communities are probably the most effective enforcement mechanisms  up to date. Closed file-sharing communities have developed tools of social control in spaces where statutory copyright is irrelevant. The enforcement efforts that target these networks destroy not just the resource pools and the communities that built them, but also  destroy the social controls that are in place,&#8221; Balázs notes.</p>
<p>&#8220;Paradoxical as this may sound, the aforementioned piratical communities may be the enforcement allies that rights-holders have been seeking all this time. In any case,  it is apparent that  they both have at least one interest in common: a sustainable cultural ecosystem. So maybe it is time to ask ourselves: should we set the foxes to watch the geese?&#8221;</p>
<p><em>Set the fox to watch the geese: voluntary IP regimes in piratical file-sharing communities</em>, <a href="http://www.scribd.com/doc/140796965/Private-Tracker-Enforcement">can be downloaded here</a>. </p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/why-private-torrent-sites-have-strict-copyright-enforcement-rules-130511/feed/</wfw:commentRss>
		<slash:comments>119</slash:comments>
		</item>
		<item>
		<title>&#8220;Six-Strikes&#8221; BitTorrent Crackdown May Target Private Trackers</title>
		<link>https://torrentfreak.com/six-strikes-bittorrent-crackdown-may-target-private-trackers-121106/</link>
		<comments>https://torrentfreak.com/six-strikes-bittorrent-crackdown-may-target-private-trackers-121106/#comments</comments>
		<pubDate>Tue, 06 Nov 2012 18:38:40 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[cci]]></category>
		<category><![CDATA[copyright alerts]]></category>
		<category><![CDATA[private-tracker]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=59765</guid>
		<description><![CDATA[The much-discussed U.S. six strikes anti-piracy scheme should consider targeting private BitTorrent trackers according to a report by Stroz Friedberg. The suggestion is published in the evidence review which was made public after bias accusations arose two weeks ago.  In addition to eyeing private trackers the report also recommends a more secure way to send incriminating data to Internet providers.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/spy.jpg" align="right" alt="spy">The MPAA and RIAA, helped by <a href="https://torrentfreak.com/isp-six-strikes-anti-piracy-scheme-120803/">five major Internet providers</a> in the United States, will start to warn and punish copyright infringers later this month.</p>
<p>The parties launched the Center for Copyright Information (CCI) and agreed on a system through which copyright infringers are warned that their behavior is unacceptable. After five or six warnings ISPs may then take a variety of repressive measures.</p>
<p>While it&#8217;s broadly described as an anti-piracy effort, the plan currently targets BitTorrent users, and only those who use public trackers. But, this may change in the near future.</p>
<p>Yesterday the CCI published a review of the evidence collecting technology used by tracking company MarkMonitor. The group decided to make a redacted version of the report public after it was revealed that the &#8220;independent&#8221; expert Stroz Friedberg <a href="https://torrentfreak.com/six-strikes-evidence-re-reviewed-to-fix-riaa-lobbying-controversy-121031/">previously worked for the RIAA</a>.</p>
<p>The review briefly describes how MarkMonitor tracks BitTorrent users. First, the company identifies possibly infringing files and these are then downloaded in full to confirm that they&#8217;re real. Next, MarkMonitor requests a piece of the file from a file-sharer, after which it records the IP-address and sends a notice to the alleged infringer&#8217;s ISP.</p>
<p>The review concludes that &#8220;MarkMonitor’s evidence collection in connection with P2P infringement is robust, defensible, and will withstand adverse party scrutiny or evidentiary challenges.&#8221; </p>
<p>However, that doesn&#8217;t mean that there&#8217;s no room for improvements. The report points out, for example, that MarkMonitor only tracks properly named torrent files that are made available through public BitTorrent trackers, not private ones.  </p>
<p>&#8220;Consider modifications to the infringement file identification process to include works with obfuscated names, or that are sourced from private trackers,&#8221; the report reads.</p>
<p>Unfortunately the paragraph that details this recommendation has been redacted. However, it&#8217;s apparent that by including torrents from private trackers the catch rate would be improved therefore boosting the deterrent function of the program. </p>
<p>While private BitTorrent trackers are often considered to be &#8220;safer&#8221; than public trackers, several of the larger ones are already being monitored by tracking companies. Users of public trackers are the easy pickings for anti-piracy companies, but private trackers can easily be targeted as well.  </p>
<p>That said, it may be more of a challenge for MarkMonitor. All users on private trackers &#8211; undercover companies like MarkMonitor included &#8211; are required to maintain a good ratio of content up and downloaded to preserve their site membership. Doing this without actively participating in the large scale distribution of copyrighted content could prove an issue.</p>
<p>In addition to targeting private BitTorrent trackers, the report also recommends a more secure way to send incriminating data to Internet providers. At the moment the data is sent via email, which is relatively vulnerable to interception.</p>
<p>&#8220;Regarding ISP notifications, to the extent possible, move away from reliance on email/SMTP and towards the use of other secure protocols such as HTTPS,&#8221; the report reads. Again, the details of this suggestion are redacted.</p>
<p>One minor &#8220;flaw&#8221; in the report is the claim that &#8220;MarkMonitor’s Methodologies effectively identify P2P online copyright infringers,&#8221; which is strictly speaking not the case as they only identify IP-addresses. </p>
<p>CCI&#8217;s executive director Jill Lesser admits that this may not be the best choice of words indeed, and that no persons can be directly identified.</p>
<p>“You’re right, it’s a question of semantics. The more detailed way to describe the process is that MarkMonitor can only and will only identify the IP addresses associated with the alleged copyright infringement occurring on P2P networks,&#8221; Lesser says. </p>
<p>Overall the report answers several important questions and the information that&#8217;s made available suggests that MarkMonitor knows what it&#8217;s doing. </p>
<p>The &#8220;six-strikes&#8221; plan is expected to start <a href="https://torrentfreak.com/att-starts-six-strikes-anti-piracy-plan-next-month-will-block-websites-121012/">later this month</a> and as time goes by more questions will be answered, including the possibility that private BitTorrent trackers will be monitored.</p>
<p><center><br>
<h5>The review</h5>
<p><iframe class="scribd_iframe_embed" src="http://www.scribd.com/embeds/112296380/content?start_page=1&#038;view_mode=scroll&#038;access_key=key-2ewt53xnepq13hul63fw" data-auto-height="true" data-aspect-ratio="0.772727272727273" scrolling="no" id="doc_28663" width="100%" height="600" frameborder="0"></iframe></center></p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/six-strikes-bittorrent-crackdown-may-target-private-trackers-121106/feed/</wfw:commentRss>
		<slash:comments>239</slash:comments>
		</item>
		<item>
		<title>TorrentIt Makes Long Awaited Comeback</title>
		<link>https://torrentfreak.com/torrentit-makes-long-awaited-comeback-080921/</link>
		<comments>https://torrentfreak.com/torrentit-makes-long-awaited-comeback-080921/#comments</comments>
		<pubDate>Sun, 21 Sep 2008 13:36:17 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[Pirate Talk]]></category>
		<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[digitalhive]]></category>
		<category><![CDATA[gazelle]]></category>
		<category><![CDATA[private-tracker]]></category>
		<category><![CDATA[torrentit]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=4860</guid>
		<description><![CDATA[TorrentIt is far from a newcomer in the BitTorrent community. The tracker has been around since 2004, but since it ran into the Duch anti-piracy lobbyists from BREIN, it has been offline. This weekend, however, the site officially relaunched, with help from their friends over at DigitalHive.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/torrentit.jpg" align="right" alt="torrentit">In BitTorrent terms, <a href="http://torrentit.eu">TorrentIt</a> has quite a long history. The tracker started out in 2004 as 123Torrents. In early 2005, they lost the 123Torrents domain, and while negotiating to get it back, took on the domain torrentit.com. When negotiations failed, they decided to keep the TorrentIt name, and applied it to the newly created pirate theme for the site.</p>
<p>TorrentIt, which had 27,000 members at its peak, was known for having a large mix of scene and non-scene torrents, and for a very tight community. In April 2006, <a href="http://torrentfreak.com/more-bittorrent-sites-going-down/">BREIN went after</a> the original owner, who lived in the Netherlands, forcing the shutdown of the site under legal pressure. The TorrentIt crew decided it was better to take the site down than to have him take the heat, and took the site down. </p>
<p>Almost a year later in January 2007, some of the former staff members decided to bring the site back, under a new domain, one not attached to the original owner. The intention was to open by the end of May, but that never happened. The deadline was missed, and it took more than a year before the site was ready for its official relaunch.</p>
<p>BlastGT1, one of the original crew members, and an Admiral (equivalent to SysOp) at the new site told TorrentFreak: &#8220;Unfortunately, due to real life commitments, we missed that deadline, and after months of stagnation, I took it upon myself to find good coders within the torrent community who could help us finish the site, and try to repair the damage we had done to TiT&#8217;s good name.&#8221;</p>
<p>TorrentIt teamed up with the coders from <a href="http://digitalhive.org/">DigitalHive</a>, who were looking to start a new side project themselves, and this eventually led to the long awaited resurrection of the tracker. &#8220;Now, we&#8217;re back with a different domain, a different source and the drive to succeed,&#8221; BlastGT1 said.</p>
<p>&#8220;We don&#8217;t care about racing sites for pre times, we don&#8217;t care about having the biggest userbase. We care about having quality torrents, scene and non-scene, and most of all, we care about community. That is what made TorrentIt stand out before, and so many are already loving its return, finding their cabins kept warm and cozy,&#8221; BlastGT1 added.</p>
<p>The new and improved tracker changed its domain extension from .info to <a href="http://torrentit.eu">.eu</a>, and now runs on <a href="http://torrentfreak.com/gazelle-rejuvenates-the-bittorrent-tracker-community-080828/">Gazelle</a>. Two days ago, they sent out almost 10K invites to former members, and many of them have joined the new site since. Unfortunately, an invite is needed to sign up, so not everybody will be able to celebrate and participate.</p>
<p>BlastGT1 has a word of advice for newcomers though: &#8220;Bide your time, get a good honest reputation elsewhere, have patience like people did once upon a time. Sooner or later you&#8217;ll make the right friend and snag an invite.&#8221;</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/torrentit-makes-long-awaited-comeback-080921/feed/</wfw:commentRss>
		<slash:comments>86</slash:comments>
		</item>
		<item>
		<title>Norbits Hackers Threaten to Release User Info</title>
		<link>https://torrentfreak.com/norbits-hackers-threaten-to-release-user-info-080918/</link>
		<comments>https://torrentfreak.com/norbits-hackers-threaten-to-release-user-info-080918/#comments</comments>
		<pubDate>Thu, 18 Sep 2008 07:22:47 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[Pirate Talk]]></category>
		<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[MORRADi]]></category>
		<category><![CDATA[norbits]]></category>
		<category><![CDATA[norbits down]]></category>
		<category><![CDATA[Norway]]></category>
		<category><![CDATA[private-tracker]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=4791</guid>
		<description><![CDATA[Norbits, the largest Norwegian BitTorrent tracker is going through some rough times. For several days now, the site has been offline due to a DDoS attack. The site has allegedly been hacked by a group called MORRADi, which is threatening to publish all IPs and more information on the users, unless the tracker is closed.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/norbits.jpeg" align="right" alt="norbits down hacked">DDoS attacks are not an unusual event for many private BitTorrent trackers. Although they are sometimes used as an excuse for server issues, most of the larger trackers have been subject to such attacks at least once.</p>
<p>Norbits is one of these trackers, a medium sized community with over 10,000 members, most of them from Norway. Norbits has suffered downtime because of DDoS attacks before, but this time the threat may be more serious than that.</p>
<p>In an NFO file obtained by by <a href=" http://www.itavisen.no/sak/786765/Tar_p%C3%A5_seg_ansvaret_for_Norbits-angrep/">IT-Avisen</a>, a group called MORRADi takes responsibility for the attack on Norbits. &#8220;Once again we show our power! Once again we show your foolishness! This is not the first time we have done it, and it won&#8217;t be the last,&#8221; they write (translated).</p>
<p>&#8220;Enough is enough, you are becoming a real nuisance, and you are also a bunch of idiots that try to hide, so it&#8217;s high time we punish you! P2P is not something we want, when will you understand that? Do we have to take it as far as publishing your user database online?&#8221;</p>
<p>The message seems to suggest that &#8220;sceners&#8221; are behind the hack and the attacks, since they don&#8217;t want their releases shared on BitTorrent trackers. IT-Avisen journalist Trond Bie thinks this is plausible, as he told <a href="http://www.dagbladet.no/kultur/2008/09/17/547192.html">Dagbladet</a>: &#8220;I know that there are people on the FTP scene that don&#8217;t like Norbits. It&#8217;s not improbable that such a group wanted to attack the servers. It&#8217;s happened before.&#8221;  Whether the group actually has access to all the IPs, usernames and transfer logs of Norbits users remains unclear. </p>
<p>This would not be the first time that a private BitTorrent tracker has been hacked. Earlier this year the IP-addresses of seedboxes and of top-users on some of the larger private trackers leaked to BitTorrent. Nevertheless, this kind of information is useless to anti-piracy organizations, as it is impossible to verify whether it is legit or not.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/norbits-hackers-threaten-to-release-user-info-080918/feed/</wfw:commentRss>
		<slash:comments>92</slash:comments>
		</item>
		<item>
		<title>Private BitTorrent Trackers Under Threat From Major Exploit</title>
		<link>https://torrentfreak.com/private-bittorrent-trackers-under-threat-from-major-exploit-080418/</link>
		<comments>https://torrentfreak.com/private-bittorrent-trackers-under-threat-from-major-exploit-080418/#comments</comments>
		<pubDate>Fri, 18 Apr 2008 18:19:35 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[DRM and Other Evil]]></category>
		<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[private-tracker]]></category>
		<category><![CDATA[tbdev]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/private-bittorrent-trackers-under-threat-from-major-exploit-080418/</guid>
		<description><![CDATA[Thousands of private BitTorrent trackers using the popular TBDev code are vulnerable to hostile takeover. According to a security researcher, a successful execution of the exploit could result in the attacker gaining admin rights to the tracker. However, knowledge and a little care can mitigate the effects.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The popular TBDev code on which thousands of private BitTorrent trackers are built, is said to be vulnerable to a major exploit. A successful attack could allow a malicious attacker to deface the main tracker page (index.php) and hijack the account of anyone who logs into the application. Worryingly it&#8217;s even possible to hijack an administrator&#8217;s account by using a social engineering attack to get them to click on specially crafted hyperlink, although most admins won&#8217;t be tricked by this method.</p>
<p>According to Michael Brooks, a security researcher who brought this issue to our attention, this particular TBDev exploit is down to the fact the developers didn&#8217;t protect the administrative interface from Cross Site Scripting attacks (<a href="http://www.owasp.org/index.php/Cross_Site_Scripting">XSS</a>).</p>
<p>The attack uses <a href="http://www.owasp.org/index.php/Cross-Site_Request_Forgery">CSRF</a> in a chain with other flaws to obtain synergy &#8211; Michael calls this CSRF Bouncing.</p>
<p>&#8220;Unfortunately this Cross Site Scripting attack is accessible by an attacker using a Cross Site Request Forgery&#8221; Michael told TorrentFreak. &#8220;The Cross Site Scripting flaw is particularly valuable. The XSS payload is stored in the main index.php for the application. This means that an attacker can expose every visitor to their payload.&#8221; </p>
<p>Michael goes on: &#8220;The CSRF flaw is POST based so it does require the administrator to execute javascript. Finding the administrator account isn&#8217;t difficult if you have a user account on the system. Like with just about every SQL powered application the administrator is the first user account created. From this profile you will be able to send a personal message and you may even be able to obtain the admin&#8217;s email address.&#8221;</p>
<p>Worryingly, even if the attacker doesn&#8217;t have a user account, it&#8217;s possible to get one using an XSS flaw.</p>
<p>Michael explained how a malicious attacker increases his chances of a success with the exploit, by combining it with a little social engineering.</p>
<p>&#8220;In this case I am using the reflective XSS flaw to make it appear as though the administrator is viewing his own web application. The social engineering attack could look something like this: &#8216;I think there is a bug in your site. Can you check this link, it just does not look right http://localhost/redir.php?url=&#8217; . This now means the flaw is no longer a &#8220;Cross Site&#8221; Request Forgery, because the request is being sent from the same website.&#8221;</p>
<p>After a successful attack it&#8217;s possible to deface the site and &#8220;hijack every user&#8217;s authentication token indefinitely&#8221;.</p>
<p>So what can be done to avoid this exploit? Michael told TorrentFreak:</p>
<p>&#8220;The most important thing to keep in mind is do not click on links that look like this. The link can be easily modified to be shorter, but the important part is avoiding links to TBDev&#8217;s /redir.php.&#8221;</p>
<p><img src="http://torrentfreak.com//images/exploit.jpg" alt="exploit"></p>
<p>&#8220;However this isn&#8217;t the only way that the flaw can be exploited.  If you visit a website that the hacker controls then he can also trigger the attack.   If you think you might have clicked on a bad link, change your password immediately.&#8221;</p>
<p>So what should an admin do if they already fell victim to the exploit?</p>
<p>&#8220;To remove the persistent XSS payload the administrator might have to login to the SQL server manually and delete the offending entry in the &#8220;news&#8221; table (since they won&#8217;t be able to use the web application to delete the news posting) using DELETE FROM news WHERE body LIKE &#8216;%fromCharCode%&#8217;.</p>
<p>The difficult part is that every user will have to change their password. In PHP I suggest defending against XSS using htmlspecialchars($var,ENT_QUOTES); . There are cases where XSS can still be possible without ENT_QUOTES. To defend against CSRF i suggest using <a href="http://www.owasp.org/index.php/PHP_CSRF_Guard">PHP CSRF Guard</a>.&#8221;</p>
<p>An administrator on a TBDev tracker we spoke with suggested a very quick fix off the top of his head:</p>
<blockquote><p>in news.php change</p>
<p>$body = $_POST["body"];</p>
<p>to</p>
<p>$body = htmlspecialchars($_POST["body"],ENT_QUOTES);</p></blockquote>
<p>We put this to Michael who told us: &#8220;The fix isn&#8217;t bad however the same fix also needs to be applied to $_GET["url"]  in redir.php or the administrator account as well as others are subjected to hijack. There are other security problems with this application,  but the XSS is the most serious as it leads to immediate attack.&#8221;</p>
<p>Earlier today TorrentFreak contacted a number of admins with details of the exploit. Michael tells us he has notified the relevant people of the flaw but it may take a few days until an official patch is made available. </p>
<p>The full details of the exploit are available <a href="http://www.rooksecurity.com/blog/?p=8">here</a>.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/private-bittorrent-trackers-under-threat-from-major-exploit-080418/feed/</wfw:commentRss>
		<slash:comments>62</slash:comments>
		</item>
		<item>
		<title>10 Tips and Tricks for Private BitTorrent Sites</title>
		<link>https://torrentfreak.com/10-tips-tricks-for-private-bittorrent-sites-080323/</link>
		<comments>https://torrentfreak.com/10-tips-tricks-for-private-bittorrent-sites-080323/#comments</comments>
		<pubDate>Sun, 23 Mar 2008 14:49:38 +0000</pubDate>
		<dc:creator><![CDATA[sharky]]></dc:creator>
				<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[Tutorial & How To]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[private-tracker]]></category>
		<category><![CDATA[ratio]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/10-tips-tricks-for-private-bittorrent-sites-080323/</guid>
		<description><![CDATA[The first thing to notice when you join a private BitTorrent site is the eye-popping quality of the torrents. Each one is carefully culled, hand-picked through a strict moderation process. However, before you start hammering away on that download link - here are a few things you need to know.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>On private torrent sites, everything revolves around ratios. A 1:1 ratio (or 1.0) means that you&#8217;ve downloaded exactly the same amount of data as you&#8217;ve uploaded. Thus a 0.80 ratio indicates that you&#8217;ve uploaded less than you&#8217;ve downloaded, which is hurtful to the health of the torrent. Inversely, a 3.0 ratio means you&#8217;ve uploaded 3 times more data than you&#8217;ve downloaded. Strive to achieve at least a 1.0 ratio &#8211; each site will have specific consequences for members who maintain a ratio of less than this. Attain a ratio over 1.0 and the rewards shall follow you into the P2P afterlife.</p>
<p>If you&#8217;re brand-new to a private site, it will be difficult in the beginning to acquire a 1.0 ratio. Luckily, users are given a &#8216;grace&#8217; period to achieve this. Since there are so many more seeds than leechers (a total flip-flop from public BT sites), it becomes harder to upload to others &#8211; due to the fact that there are fewer people to share with.</p>
<p>So why go through all the trouble to keep an honest ratio? Because deep down, you&#8217;re an upstanding denizen of file-sharing society! Aside from that shameless pat-on-the-back, good ratios offer many perks, including an upgraded account on the tracker (i.e. VIP status), higher download speeds, free &#8220;invites&#8221; for your friends, and no waiting periods associated with accounts in arrears.</p>
<p>Here are Ten Tips to get your ratio in top-shape as fast as possible:</p>
<h4>1. Start out with Smaller Files</h4>
<p>Initially, opt for smaller (i.e. under 1 GB) files for downloading. This gives you a greater chance of someone coming along after you and downloading the same torrent (and you&#8217;ll be able to upload to them). Obviously a 700MB movie file will be more appealing to other site members than a 30GB &#8216;Blu-Ray&#8217; rip.</p>
<h4>2. Jump on the &#8216;Newly Released&#8217; torrents</h4>
<p>This is a great tip for increasing your ratio in a hurry. Camp out in your favorite private BT site, and refresh the torrent listings frequently. Newly added entries will have many more leechers than seeds, so you&#8217;ll be able to share (upload) more data. To maximize this tip, select smaller files &#8211; the &#8220;TV Episode&#8221; category works great for this.</p>
<h4>3. Select Files that have a High &#8216;L&#8217; or upload number</h4>
<p>This is important. When selecting torrents, base your initial selections on a high number of leechers (the more, the better). This will ensure you have many avenues to upload to during (and after) the transfer. When starting out on a new private BT site, we would even go so far as to say that you should download torrents that you don&#8217;t want &#8211; just start grabbing torrents that have lots of leechers. Once your ratio get over the 1:1 (1.0) mark, delete them.</p>
<p>TIP: If one of your seeding torrents remains popular, leave it running in Âµtorrent permanently. This will always help to boost your upload ratio.</p>
<h4>4. Avoid &#8216;Zero-Leech&#8217; torrents</h4>
<p>When you&#8217;re new to a private site, steer clear of the &#8216;zero-leech&#8217; torrents &#8211; it is impossible to increase your share ratio when there are no other downloaders. When viewing a list of torrents, look for the &#8220;Leecher&#8221; column (or just &#8220;L&#8221;) and avoid anything that has a zero ( &#8220;0&#8243; ) in it. After your account ratio has become relatively stable, now is the time to snag whatever you want.</p>
<h4>5. Leave some tasks running in uTorrent</h4>
<p>After the completed download of a torrent, leave the task running (as a seed) in Âµtorrent to increase your upload statistics. Don&#8217;t delete (or move) the files of a running task! You can, however, extract (unRAR) the files, or copy the files from one place to the next. In the event of a movie/video file &#8211; you&#8217;ll be able to &#8220;burn&#8221; or &#8220;extract&#8221; the *.avi file (or even play it on the PC) without affecting the seeding torrent.</p>
<p>TIP: Always keep a few things running as &#8216;seeds&#8217; in your BT client. If you notice that they aren&#8217;t uploading, replace them with newer ones.</p>
<h4>6.  Go for the &#8216;Freebie&#8217; downloads</h4>
<p>Many private sites will offer &#8220;free&#8221; torrents that won&#8217;t count against your download statistics (thus, your ratio will remain unchanged). Grab these freebies &#8211; especially when searching for torrents on a new account.</p>
<h4>7. Use &#8216;Credits&#8217; to purchase&#8230;</h4>
<p>A popular feature among superior private BitTorrent sites is the addition of a &#8216;credits&#8217; feature for account holders. Credits can be used to &#8216;purchase&#8217; VIP status, increased sharing ratios and other perks. Not all sites are the same, but some credits can be acquired just from staying active in their IRC channel, or from just having the torrents available for download in your BT client.</p>
<h4>8. Do NOT try to &#8216;cheat&#8217; the Private Trackers</h4>
<p>There are a variety of ratio cheating tips available out there, but don&#8217;t be tempted. Trackers are fairly sophisticated and ever-evolving. If you get caught cheating, you won&#8217;t even be warned &#8211; it&#8217;s a permanent ban for you and bye-bye for good.</p>
<h4>9. Set a proper Upload Limit</h4>
<p>Setting a proper upload limit in the BT client makes all the difference! You&#8217;ll want to supply a high enough limit to maximize uploading, but not have it eat into your download bandwidth. The general rule is to set it at 80 &#8211; 85% of your upload limit. To figure this out, visit <a href="http://www.speedtest.net" title="www.speedtest.net - Test your Internet Speeds">www.speedtest.net</a> and conduct the simple test. Results are shown in kilobits, so divide the result by 1/8 and then multiply that by 0.85. This will give you the proper number in KB/s (KiloBytes).</p>
<p>In <a href="http://www.utorrent.com" title="www.utorrent.com">Âµtorrent</a>, go to OPTIONS &gt; Preferences&#8230; &gt; Connection and enter your upload rate. Click &#8220;Apply&#8221; and then &#8220;OK&#8221; to save the changes. While your in that same &#8216;settings&#8217; page, make sure to use a port number from the good list (e.g. 49152 &#8211; 65535).</p>
<p><img src="http://torrentfreak.com/images/utorrent_8.jpg"></p>
<h4>10. And if all else fails&#8230;<em>donate</em></h4>
<p>Most sites allow for monetary contributions to keep up with the server costs. If you enjoy a particular site immensely but cannot seem to be able to approach a decent sharing ratio (due to turning off your computer at night, going to work, or sharing your computer with your kids, wife, husband or siblings), think about donating. In most cases even a not-so-generous gratuity will robustly affect your account status &#8211; plus you&#8217;ll feel good about helping out the BitTorrent community.</p>
<h4>Other Tips &#8211; Follow &#8216;The Rules&#8217;</h4>
<p>Yeah, we know: you hate rules!  That&#8217;s why you probably moved out of your parents&#8217; basement. Rules are probably why some turned to P2P.</p>
<p>Nevertheless, rules are an important aspect to private BT sites &#8211; they ensure healthy torrents and blazing-fast download speeds for all. Each site will have their &#8220;rules&#8221; posted &#8211; the link is usually not hard to find. Below are some general rules / tips that pertain to any private BitTorrent site:</p>
<h4>Use an &#8216;Accepted&#8217; BitTorrent client</h4>
<p>Not all private trackers are the same &#8211; and each one has different rules in regards to which BitTorrent client is on the &#8220;allowable&#8221; list. Most sites recommend <a href="http://www.utorrent.com" title="www.utorrent.com">Âµtorrent</a>, but only specific versions (or builds) of it. If you stick with v1.6.1 or the latest version <strong>v1.7.7</strong> (recommended), you can&#8217;t go wrong with ANY private site (avoid any versions in between these numbers). And do not use BitComet on private trackers.</p>
<h4>Proper BitTorrent client configuration:</h4>
<p>Many trackers recommend that you disable DHT and Peer Exchange (PEX) in your BT client&#8217;s settings. To do this in Âµtorrent, go to OPTIONS &gt; Preferences&#8230; &gt; and select the BitTorrent tab. Remove the three checkmarks that pertain to DHT and PEX (see image below):</p>
<p><img src="http://torrentfreak.com/images/utorrent_1.gif" width="475"></p>
<h4>Do not &#8216;Hit &amp; Run&#8217; a Private BT site:</h4>
<p>A &#8216;Hit &amp; Run&#8217; (or H&amp;R) is when someone joins a private tracker, and downloads as much as they can before making off without uploading to a proper ratio. While this practice is frowned upon even on public sites such as <a href="http://www.mininova.org" title="www.mininova.org">mininova.org</a>, it is  deplorable to private sites. This can (and sometimes will) lead to your IP address being banned from the site &#8211; forever.</p>
<p>Stick within these guidelines for HAPPY Torrenting!</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/10-tips-tricks-for-private-bittorrent-sites-080323/feed/</wfw:commentRss>
		<slash:comments>197</slash:comments>
		</item>
		<item>
		<title>Private BitTorrent Trackers Vulnerable To Anonymous Leechers</title>
		<link>https://torrentfreak.com/private-bittorrent-trackers-vulnerable-to-anonymous-leechers-070907/</link>
		<comments>https://torrentfreak.com/private-bittorrent-trackers-vulnerable-to-anonymous-leechers-070907/#comments</comments>
		<pubDate>Fri, 07 Sep 2007 15:14:13 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[peerlist]]></category>
		<category><![CDATA[private-tracker]]></category>
		<category><![CDATA[ratio]]></category>
		<category><![CDATA[scenetorrents]]></category>
		<category><![CDATA[torrentleech]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/private-bittorrent-trackers-vulnerable-to-anonymous-leechers-070907/</guid>
		<description><![CDATA[Since the birth of restrictions, there's always been someone ready to set-free. BitTorrent set media free and then for a multitude of reasons, private torrent trackers restricted it. It appears that a group of people have published a method to allow non-members to leech private trackers for free. But at what cost?<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>A private tracker is a site which tracks/indexes torrents in the same way that a public one does but requires the user to become a registered member first. Depending on a site&#8217;s popularity and growth strategy, the work involved in becoming a member can range from &#8216;easy&#8217;, right up to &#8216;almost impossible&#8217; &#8211; there are even <a href="http://torrentfreak.com/get-into-private-bittorrent-sites-with-tracker-checker-2/">tools</a> <a href="http://torrentfreak.com/now-mac-users-can-easily-get-into-private-bittorrent-trackers-too/">available </a>to automate the task and sites to trade <a href="http://www.inviteshare.com/">invitations</a>.</p>
<p>Why would anyone bother accessing a private site when you can get great stuff from PirateBay or Mininova? Most users cite better download speeds, great timing and availability of content while others believe they have better security. Most private trackers require that the user maintains a good &#8216;ratio&#8217; &#8211; i.e he uploads back to the community the amount of data that he took. Because this behavior is monitored and enforced by a range of punishments, the user tends to seed more to avoid them. The ultimate punishment for not sharing is banning, which means the member can no longer access the content indexed within, well &#8211; that&#8217;s usually the case.</p>
<p>Information has been published showing a method for non-members to access and download stuff from private sites, using the (optional) Azureus <a href="http://azureus.sourceforge.net/plugin_details.php?plugin=azpeerinjector">Peer Injector</a> plug-in and lists of peers (BitTorrent users IP addresses and ports they use) harvested from well known private trackers. Usually it&#8217;s the tracker on a site that decides if you can join the swarm or not (while recording your stats/ratio) but by using this method it&#8217;s theoretically possible to enter the swarm of a particular torrent without ever connecting to the tracker. The theory says that as long as you can access a .torrent file originating from the site (via a torrent dump site such as mininova, a friend or the site&#8217;s unprotected RSS feed for example) plus an accurate and up to date peerlist, you can download without being a member, ratio-free.</p>
<p>However useful this might sound to some, there is a cost. For the method to work, the group needs to harvest user&#8217;s IP addresses from each tracker they wish to exploit and make them available for people to download. They appear to have already compromised the privacy of users of TorrentLeech and SceneTorrents by publishing their IP addresses in a <a href="http://deshtept.org/2007/08/18/using-peerlists/">peerlist</a>, at the same time claiming the method improves the individual&#8217;s privacy.</p>
<p>Its common on P2P forums for people to debate the benefits and drawbacks of public and private sites. Some feel private sites restrict, while others understand that a site&#8217;s growth sometimes needs to be artificially limited due to technical, staffing or budget issues. Some feel it&#8217;s wrong to ring-fence the available media and that it should really be &#8216;set-free&#8217; while others feel that it&#8217;s neat being a member at a fast tracker with great image and they&#8217;re quite happy at being part of an &#8216;exclusive&#8217; club.</p>
<p>In any event, I guess both parties are on <em>roughly</em> the same side in the end and they would likely agree &#8211; although of limited use on their own, the user&#8217;s IPs on sites like TorrentLeech, SceneTorrents and any other tracker should definitely be kept as private as possible, even if others believe the torrents shouldn&#8217;t be.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/private-bittorrent-trackers-vulnerable-to-anonymous-leechers-070907/feed/</wfw:commentRss>
		<slash:comments>65</slash:comments>
		</item>
		<item>
		<title>Now Mac Users Can Easily Get Into Private BitTorrent Trackers Too</title>
		<link>https://torrentfreak.com/now-mac-users-can-easily-get-into-private-bittorrent-trackers-too/</link>
		<comments>https://torrentfreak.com/now-mac-users-can-easily-get-into-private-bittorrent-trackers-too/#comments</comments>
		<pubDate>Wed, 01 Aug 2007 10:38:26 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[Tutorial & How To]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Milen-Georgiev-Dzhumerov]]></category>
		<category><![CDATA[private-tracker]]></category>
		<category><![CDATA[tracker-checker]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/now-mac-users-can-easily-get-into-private-bittorrent-trackers-too/</guid>
		<description><![CDATA[Last week we announced the availability of a PC-only application to automate the checking of Private BitTorrent Trackers for open signups. After reading the article a developer contacted us, said he loved the idea and set about coding a version for all the Mac users out there. We have the software here for download, free of charge.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Last week we published an <a href="http://torrentfreak.com/get-into-private-bittorrent-sites-with-tracker-checker-2/">article</a> about the Tracker Checker 2 application for PC. On occasion, invite-only private BitTorrent trackers open up their doors for a limited period where people can signup without an invite. However, this involves visiting the site in question at just the right time as registrations are opened &#8211; a very hit and miss task. Tracker Checker 2 automated that process but unfortunately, it&#8217;s for PC only.</p>
<p>Shortly after we published, we had a contact from Milen Georgiev Dzhumerov, a regular reader of TorrentFreak and Mac software programmer. &#8220;When I saw the Tracker Checker I thought it was a great idea &#8211; so simple and useful&#8221; he said, &#8220;I&#8217;m waiting to start uni in October, I&#8217;ve got nothing better to do except write software! As I am a Mac user, I decided to create a Mac version of the app.&#8221;</p>
<p><img src="http://torrentfreak.com//images/tcmac1.gif" align="right" alt="TrackerChecker"></p>
<p>The application arrives in .DMG format at just 221kb. Full installation instructions are included in the README file but it&#8217;s simply a question of dragging the software&#8217;s icon (created by <a href="http://yellowicon.com/">YellowIcon</a>) into the &#8216;Applications&#8217; folder.</p>
<p>Launching is achieved by browsing to the app and double-clicking it. The .DMG file comes with a trackers.xml file (containing the tracker information) and is pre-configured with 67 trackers. Simply navigate to the .DMG, select the trackers.xml and import it. </p>
<p>There are 4 main buttons on the toolbar (created by <a href="http://www.mattballdesign.com/">Matt Ball Design</a>): </p>
<p>Reload &#8211; Manually &#8220;reloads&#8221; all trackers<br>
Add &#8211; Adds a new tracker to the list<br>
Remove &#8211; Removes the currently selected tracker<br>
Info &#8211; Opens the &#8220;Tracker Inspector&#8221; allowing the modification of tracker properties.</p>
<p>In the lower right corner there is a setting for selecting how many concurrent connections to open when checking the trackers. Tested on an 8mbit down connection, 15-20 connections produced ideal results.</p>
<p><img src="http://torrentfreak.com//images/tcmac2.gif" align="right" alt="TrackerChecker Inspector"></p>
<p>Positive match type in the &#8216;Inspector&#8217; is defined as marking the tracker as open if the find string is found and negative is just reversing the result of whatever the positive is returning, i.e if it doesn&#8217;t find the string you have selected negative, the tracker will be marked as open.</p>
<p>One of the criticisms leveled at the PC version of Tracker Checker 2 was that it checked sites for signups at a too regular interval of just 60 seconds. The Mac version addresses this with the chance for the user to choose the update interval.</p>
<p><img src="http://torrentfreak.com//images/tcmac3.gif" align="right" alt="TrackerChecker Inspector"></p>
<p>Milen goes on to explain that he had another motive to develop the app: &#8220;The other reason for doing it was to actually see how good Cocoa stacks up against .NET/Java for simple applications like this one. I wanted to prove to myself that you can write applications in Cocoa rapidly. I would say that the app took me about a day/day and a half of proper work (I&#8217;m subtracting the time where I jumped in to play some games or watch a movie). I didn&#8217;t encounter any problems when using Apple&#8217;s well-designed frameworks and I&#8217;m very happy with how it turned out.&#8221;</p>
<p>More features are planned for the next release:</p>
<p>- Localization (definitely German + unconfirmed others)<br>
- Growl support<br>
- HTTP authentication and redirection support</p>
<p>Anyone wishing to translate the app, suggest features or report bugs, should get in touch with Milen on gamehack@gmail.com</p>
<div class="alert"><a href="/files/Tracker Spy.dmg">The application can be downloaded here</a></div>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/now-mac-users-can-easily-get-into-private-bittorrent-trackers-too/feed/</wfw:commentRss>
		<slash:comments>33</slash:comments>
		</item>
		<item>
		<title>Demonoid Open for Registration</title>
		<link>https://torrentfreak.com/demonoid-open-for-registration/</link>
		<comments>https://torrentfreak.com/demonoid-open-for-registration/#comments</comments>
		<pubDate>Wed, 19 Apr 2006 18:12:53 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[demonoid]]></category>
		<category><![CDATA[private-tracker]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/demonoid-open-for-registration/</guid>
		<description><![CDATA[Demonoid Downtime<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="alert">You can get demonoid invites at <a href="http://getinvites.org/">Getinvites.org</a></div>
<p><strong>Update June 26, 2007</strong><br>
<a href="http://torrentfreak.com/demonoid-offline-for-a-few-days/">Demonoid Offline For a Few Days</a></p>
<p><strong>Update January 3 2007</p>
<p>Demonoid is currently down for maintenance<br>
Will be back soon<br>
</strong><br>
Just to let you know, demonoid.com is open for registration. Demonoid is one of the biggest private torrent sites on the web and the most widely used BitTorrent tracker, together with the piratebay.</p>
<p><a href="http://www.demonoid.com/register.php">Get in</a> before it&#8217;s too late. </p>
<p>You will be rewarded!</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/demonoid-open-for-registration/feed/</wfw:commentRss>
		<slash:comments>190</slash:comments>
		</item>
	</channel>
</rss>
