<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; TOR</title>
	<atom:link href="https://torrentfreak.com/tag/tor/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 09:27:11 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Hustler Hustles Tor Exit-Node Operator Over Piracy</title>
		<link>https://torrentfreak.com/hustler-hustles-tor-exit-node-operator-piracy-140901/</link>
		<comments>https://torrentfreak.com/hustler-hustles-tor-exit-node-operator-piracy-140901/#comments</comments>
		<pubDate>Mon, 01 Sep 2014 15:07:20 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[copyright trolls]]></category>
		<category><![CDATA[Finland]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=93331</guid>
		<description><![CDATA[Dozens of adult companies are using "copyright trolling" tactics to supplement their income, and Larry Flynt's Hustler is one of them. The company recently demanded a 600 euros settlement from a Finnish Tor exit-node operator,  who also happens to be the Vice-President of a local Pirate Party branch.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/tor.png"><img src="http://torrentfreak.com/images/tor.png" alt="tor" width="222" height="134" class="alignright size-full wp-image-93341"></a>Faced with the growing threat of online file-sharing, Hustler <a href="http://torrentfreak.com/hustler-hires-media-protector-to-chase-porn-pirates-090103/">committed</a> to “turning piracy into profit” several years ago.</p>
<p>The company has not been very active on this front in the United States, but more so in Europe. In Finland for example Hustler is <a href="http://torrentfreak.com/file-sharing-copyright-trolls-invade-finland-140326/">sending out settlement demands</a> for hundreds of euros to alleged pirates. </p>
<p>A few days ago one of these letters arrived at the doorstep of <a href="http://sebastianmaki.fi/">Sebastian Mäki</a>, identifying the IP-address through which he offers a <a href="http://en.wikipedia.org/wiki/Tor_(anonymity_network)">Tor</a> exit-node. According to Hustler the IP-address had allegedly transferred a copy of Hustler&#8217;s &#8220;This Ain&#8217;t Game Of Thrones XXX.&#8221;</p>
<p>The <a href="http://torrentfreak.com/images/hedmanpartners-letter.txt">letter</a> is sent by lawfirm Hedman Partners who urge Mäki to pay 600 euros ($800) in damages or face worse.</p>
<p>However, Mäki has no intention to pay up. Besides running a Tor exit-node and an open wireless network through the connection, he also happens to be Vice-President of a local Pirate Party branch. As such, he has a decent knowledge of how to counter these threats.</p>
<p>&#8220;All we can do at the moment is fight against these trolls, and they are preying on easy victims, who have no time nor energy to fight and often are afraid of the embarrassment that could follow, because apparently porn is still a taboo somewhere,&#8221; Mäki tells TorrentFreak.</p>
<p>So instead of paying up, the Tor exit-node operator launched a counter attack. He wrote a <a href="http://semantics.sebastianmaki.fi/2014/08/an-open-letter-is-copyright-trolling.html">lengthy reply</a> to Hustler&#8217;s lawyers accusing them of blackmail. </p>
<p>&#8220;According to Finnish law, wrongfully forcing someone to dispose of their financial interests is known as blackmail. Threatening to make known one&#8217;s porn watching habits unless someone coughs up money sounds to me like activities for which you can get a sentence.&#8221; </p>
<p>Mäki explains that an IP-address is not necessarily a person and that Hustler&#8217;s copyright trolling is likely to affect innocent Internet users. Because of this, he has decided to report these dubious practices to the police.</p>
<p>&#8220;I am also concerned that other innocent citizens might not have as much time, energy, or wealth to fight back. Because your actions have the potential to cause so much damage to innocent bystanders, I find it morally questionable and made a police report.&#8221;</p>
<p>Whether the police will follow up on the complaint remains to be seen, but Hustler will have to take its hustling elsewhere for now. They clearly targeted the wrong person here, in more ways than one.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/hustler-hustles-tor-exit-node-operator-piracy-140901/feed/</wfw:commentRss>
		<slash:comments>49</slash:comments>
		</item>
		<item>
		<title>PirateBrowser Hits 500,000 Downloads, Tor Traffic Surges</title>
		<link>https://torrentfreak.com/pirate-browser-hits-500000-downloads-130830/</link>
		<comments>https://torrentfreak.com/pirate-browser-hits-500000-downloads-130830/#comments</comments>
		<pubDate>Fri, 30 Aug 2013 15:59:58 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[piratebrowser]]></category>
		<category><![CDATA[TOR]]></category>
		<category><![CDATA[tpb]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=76300</guid>
		<description><![CDATA[The Pirate Bay’s PirateBrowser is expanding its user base rapidly, far beyond the expectations of the site's operators. The Tor-based browser, which allows people to bypass ISP filtering and access blocked websites, has already been downloaded more than 500,000 times since its launch earlier this month. The increase in downloads coincides with a mysterious increase in Tor users, but contrary to speculation it's unlikely that the two events are related.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/piratebrowser.jpg" align="right" alt="pirate browser">On the occasion of its 10th anniversary last Saturday, The Pirate Bay <a href="http://torrentfreak.com/pirate-bay-releases-pirate-browser-to-thwart-censorship-130810/">shared a gift</a> with its users – the <a href="http://piratebrowser.com/">PirateBrowser</a>.</p>
<p>Faced with ISP blockades all over the world, The Pirate Bay is arguably the most censored website on the Internet. The PirateBrowser software allows people to bypass these restrictions, using the Tor network to obfuscate people&#8217;s locations.</p>
<p>Unlike the Tor browser, PirateBrowser does not provide full anonymity. It&#8217;s only meant to unblock The Pirate Bay in regions where it&#8217;s censored, which is good enough for most users of the site. Downloads of the tool are going through the roof.  </p>
<p>The Pirate Bay team informs TorrentFreak that the PirateBrowser notched up its 500,000th download earlier this week. At the time of publication it has surpassed 550,000 with no signs of a decline in interest. </p>
<p>Aside from the impressive download figures, the browser was also repeatedly linked to another news event this week.  </p>
<p>Around the same time the PirateBrowser was launched, the number of users on the Tor network started to grow rapidly. Tor project leader Roger Dingledine mentioned the spike on the Tor email list, <a href="https://lists.torproject.org/pipermail/tor-talk/2013-August/029582.html">hinting</a> that PirateBrowser may have something to do with it.</p>
<p>As can be seen in the graph below, in little over a week the number of Tor users jumped from a stable average of 550,000 to well over 1,400,000. </p>
<h5>Daily Tor users worldwide</h5>
<p><img src="http://torrentfreak.com/images/tor-world.png" alt="tor-world" width="549" height="324" class="alignnone size-full wp-image-76308"></p>
<p>While it is a coincidence that PirateBrowser was launched around the same time the growth started, it seems unlikely that the two events are related. </p>
<p>First of all, the number of daily Tor users increased by more than 800,000, which is far more than the total number of downloads of PirateBrowser thus far. In addition, looking more closely at the increase in Tor users we see that the spike started August 19, more than a week after PirateBrowser launched. </p>
<p>Finally, the country specific Tor usage shows that the increase is most pronounced in South America. In Argentina and Brazil for example, where The Pirate Bay isn&#8217;t censored, Tor usage increased by more than 1000%. In the UK and the Netherlands, where blocks are in place, we only see a &#8220;modest&#8221; doubling in Tor users. </p>
<h5>Daily Tor users Brazil</h5>
<p><img src="http://torrentfreak.com/images/tor-brazil.png" alt="tor-brazil" width="549" height="323" class="alignnone size-full wp-image-76307"></p>
<p>From the above it is safe to conclude that given that there was no significant Tor related news on the 19th, the most likely explanation is that the growth is unnatural. Perhaps a Botnet might explain it?</p>
<p>While PirateBrowser may not be responsible for the increase in Tor users, the half million download milestone is no less impressive. The Pirate Bay team informs TorrentFreak that they will continue developing the browser and Mac and Linux versions will be out later this year. </p>
<p>At the same time The Pirate Bay continues development on another anti-censorship tool, one that is destined to have an even bigger impact. They are working on a special BitTorrent-powered application, which lets users store and distribute The Pirate Bay and other websites on their own computers, making it impossible for third parties to block them.</p>
<p>This new tool should be able to keep The Pirate Bay operational, even if the site itself is pulled offline. </p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/pirate-browser-hits-500000-downloads-130830/feed/</wfw:commentRss>
		<slash:comments>82</slash:comments>
		</item>
		<item>
		<title>Should Authorities Decrypt VPNs and Tor &#8211; or Ban Them Altogether?</title>
		<link>https://torrentfreak.com/should-authorities-decrypt-vpns-and-tor-or-ban-them-altogether-130817/</link>
		<comments>https://torrentfreak.com/should-authorities-decrypt-vpns-and-tor-or-ban-them-altogether-130817/#comments</comments>
		<pubDate>Sat, 17 Aug 2013 10:34:05 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[TOR]]></category>
		<category><![CDATA[vpn]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=75618</guid>
		<description><![CDATA[There are many legitimate uses for technology such as VPNs and Tor but of course there are those who use them for criminal and objectionable practices. As Russia prepares an attempt to ban Tor completely, police in Sweden now want to be able to gain access to encrypted communications in cases of serious abuse. But should the privacy rights of millions be utterly compromised because of the activities of the few?<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/encryption.jpg"><img src="http://torrentfreak.com/images/encryption.jpg" alt="encryption" width="180" height="135" class="alignright size-full wp-image-75305"></a>If the revelations of Edward Snowden have taught us anything, it&#8217;s that our activities online can hardly be considered private.</p>
<p>When we write private emails or fire off instant messages, someone somewhere has the ability to access their contents and, if necessary, act on what they&#8217;ve seen.</p>
<p>We&#8217;re told that this is a necessary evil, that our countries&#8217; security depends on us giving up some of our freedoms, indeed some of our rights &#8211; including the right to privacy &#8211; in order to keep us all safe from the ill intentions of the world&#8217;s bogeymen.</p>
<p>But despite the assurances of our leaders, most of us simply don&#8217;t want to be spied on.</p>
<p>You almost certainly can&#8217;t tell, but this article was placed on TorrentFreak&#8217;s servers using an encrypted connection. There&#8217;s nothing illegal about this article or the way it was written and its author isn&#8217;t wanted for crimes anywhere and isn&#8217;t trying to cover any up. Encryption has simply become part of life and turning on a VPN here is now as natural as firing up a browser.</p>
<p>But with the perhaps needlessly over-cautious cast aside for a moment, there are those who really do need to stay encrypted for genuinely important reasons. For dissidents around the globe privacy can be a matter of life and death and for whistle-blowers the need to remain in the shadows is paramount, as the unfortunate cases of Manning and Snowden illustrate.</p>
<p>Sadly, and despite all the good carried out via encrypted communications such as Tor, there&#8217;s a bitter pill to swallow. There are criminals &#8211; serious criminals committing horrible crimes &#8211; that use these very same systems in order to hide their identities. What&#8217;s to be done about these individuals when their online activities are cloaked? Swedish police think they have the answer.</p>
<p>&#8220;We must have a law that allows us to get access to the encrypted services. We need to get a key to access the serious crime,&#8221; <a href="http://sverigesradio.se/sida/artikel.aspx?programid=83&#038;artikel=5618974">says</a> Per-Åke Wecksell from the Cybercrime Section of the National Criminal Investigation Department.</p>
<p>Wecksell says gaining back-door access to encryption services is necessary to clamp down on the growing problem of child abuse. Those who engage in such activities are now acutely aware they&#8217;re targets for the police so they&#8217;re increasingly taking special steps to ensure they remain untraceable.</p>
<p>But of course, once police have the authority to decrypt encryption (and it&#8217;s currently extremely unclear how that could be achieved from a technical standpoint), the security of non-abusers using these systems take a massive hit too, through no fault of their own.</p>
<p><a href="http://torrentfreak.com/images/data.jpg"><img src="http://torrentfreak.com/images/data.jpg" alt="data" width="180" height="120" class="alignright size-full wp-image-75303"></a>&#8220;In the world outside the Internet, the police do not go to any lengths to try to chase criminals, for the simple reason that it would hurt other people. It&#8217;s the same online,&#8221; says Anna Troberg, chairman of the Pirate Party.</p>
<p>&#8220;For example, I have talked with a lot with human rights organizations that are totally dependent on having encrypted information to do their work with activists in other countries, that opportunity would surely be threatened if the police have the ability to decrypt things.&#8221;</p>
<p>Of course, it could be argued that restraints could be put on the police so that any new law states clearly that decryption could only take place in cases of suspected child abuse. However, during the crafting of any new legislation there would be calls by interested parties to throw other crimes into the mix &#8211; terrorism and issues of national security for instance.</p>
<p>A likely catch-all term of decryption for only &#8220;serious crimes&#8221; would then be wide open for manipulation by interested parties, meaning that while today abusers and terrorists would be hunted down, tomorrow&#8217;s targets would include <strike>whistleblowers</strike> <a href="http://www.washingtonpost.com/blogs/erik-wemple/wp/2013/06/10/edward-snowden-leaker-source-or-whistleblower/">traitors</a> such as Edward Snowden and <strike>alleged copyright infringers</strike> master criminals such as Kim Dotcom.</p>
<p>Russia is currently grappling with the same issue, although they appear to be going down a different route. According to local news reports, the head of the Federal Security Service (FSB) has initiated a process which will see the introduction of laws that will not allow the decryption of Tor and other anonymous networks, but will ban them completely from the Russian controlled Internet.</p>
<p>The process was uncovered when a request to have Tor blocked on the grounds it is used by child abusers was sent to the FSB by the Bounty Hunters civil movement. But even the movement have their doubts about blocking. Their chief, Sergey Zhuk, told Russian <a href="http://izvestia.ru/news/555552">media</a> that he would prefer it if Tor operators were forced to work with the authorities instead.</p>
<p>So it appears we are left with three current approaches.</p>
<p>1 &#8211; The status quo where everyone keeps their privacy, serious criminals included.<br>
2 &#8211; Trusting the police with the keys in the hope they only go after the really bad guys.<br>
3 &#8211; Blocking anonymity tools altogether.</p>
<p>The battle now, to maintain a free and open Internet and the privacy rights of millions, is to find a way to weed out the bad guys without ruining it for everyone else. It might be the most complicated Internet task ever carried out, but someone is going to have to find a fourth option.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/should-authorities-decrypt-vpns-and-tor-or-ban-them-altogether-130817/feed/</wfw:commentRss>
		<slash:comments>304</slash:comments>
		</item>
		<item>
		<title>Tor Servers Bombarded With BitTorrent DMCA Notices</title>
		<link>https://torrentfreak.com/tor-servers-bombarded-with-bittorrent-dmca-notices-110502/</link>
		<comments>https://torrentfreak.com/tor-servers-bombarded-with-bittorrent-dmca-notices-110502/#comments</comments>
		<pubDate>Mon, 02 May 2011 12:34:44 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[Copyright Issues]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[DMCA]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=34633</guid>
		<description><![CDATA[The Tor network is a great service for those who wish to browse the Internet anonymously and uncensored. Unfortunately, however, there are still people who abuse the network's resources by running their BitTorrent downloads over Tor servers. As a result, these servers are bombarded with DMCA notices, which in some cases may lead to them being disconnected.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/tor-onion.jpg" align="right" alt="tor onion">Increasingly people are trying to hide their IP-addresses when they browse the Internet or share files on BitTorrent. </p>
<p>Those who wish to do so can choose from plenty of great VPN services that are perfectly suited for this, and there are even specialized BitTorrent proxies such as <a href="http://btguard.com/">BTguard</a>.</p>
<p>The benefit of the above services is that they allow users to browse and download &#8216;anonymously,&#8217; but at full speeds. The downside is that users have to cough up a few bucks a month for these premium services. </p>
<p>Perhaps in an attempt to avoid a paid subscription, there is also a certain group of BitTorrent users who use the Tor network to anonymize their traffic. This is a big problem. Although one BitTorrent user taking this option is unlikely to prove problematic, a few thousand can cause some serious damage, in more ways than one.</p>
<p>Aside from crippling the network by transferring massive amounts of data over a system that is set up for web browsing, Tor servers are also being monitored and subsequently notified by copyright holders for facilitating &#8220;infringing&#8221; transfers. The DMCA notices that copyright holders send out are strictly speaking not a problem, but some ISPs freak out over them, which may lead to servers being disconnected.</p>
<p>One Tor service that has received its fair share of DMCA notices over the last month is <a href="https://www.torservers.net/">Torservers.net</a>. A few days ago the operator <a href="https://www.torservers.net/wiki/dmca">posted</a> a collection of 190 recent DMCA notices, and that only represented those received in a 20 day period. Most of the automated notices received were sent by MediaSentry (now Peer Media), on behalf of several major movie studios and other copyright holders.</p>
<p>As the Torservers.net operator Moritz Bartl explains, Tor servers are protected by the DMCA just like major ISPs are, but that doesn&#8217;t mean the avalanche of DMCA notices can&#8217;t do any harm. The companies where Torservers.net rents its servers may become worried about the large amounts of complaints being received and decide to kick their client nonetheless.</p>
<p>This is exactly what happened to Torservers.net in the past.</p>
<p>&#8220;The most frighting example was Softlayer. We had a deal with 100tb.com, a team of friendly and understanding people that use Softlayer as data center. Nonetheless, Softlayer cut us off after one single DMCA complaint that referenced a port we didn&#8217;t even allow to exit at that time,&#8221;  Bartl told TorrentFreak.</p>
<p>&#8220;They did not care and didn&#8217;t want to hear any explanations, they just forced us off their network. This is an absurd situation similar to the recent <a href="http://torrentfreak.com/facebook-shamed-by-copyright-screwup-110429/">Facebook incidents</a>, because anyone could send DMCA complaints, and it is very hard to find ISPs that first ask for proof before taking action,&#8221; he added.</p>
<p>Talking to TorrentFreak, Moritz Bartl further said that he encourages the public to take a look at the emails to see if there&#8217;s a clear pattern to identify. This will help him and others to control the DMCA spam. Eventually, he might end up blocking the IP-addresses of all major BitTorrent trackers as a last resort.</p>
<p>Hosting companies who are Tor friendly and can take DMCA notices in their stride are being welcomed to get in touch too. The Torservers.net operator tried to contact the senders of the notices to come to a more workable solution, but thus far they seem to be unreachable.</p>
<p>The ultimate setup for Torservers.net is one where the hosting provider reassigns the IP-range to them, so they can handle the abuse emails directly. For ARIN IPs this doesn&#8217;t work, but then the provider could simply forward the DMCA notices, automatically or not, so Torservers.net can take care of it.</p>
<p>&#8220;We auto-reply to Mediasentry DMCA spam, telling them that we are not allowed to keep customer logs based on the German telecommunications law, and that we are not liable for content transmission. That&#8217;s what every ISP in the world should do &#8211; unless local laws require them to keep customer logs that is. Only a few countries really force you to keep customer logs though,&#8221; Bartl said.</p>
<p>The most important lesson, however, is that those who value anti-censorship tools should not abuse Tor by running their BitTorrent traffic over it. Although the massive amount of DMCA notices shows that it works, it may eventually mean that Tor is no longer available to the people who it was built for.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/tor-servers-bombarded-with-bittorrent-dmca-notices-110502/feed/</wfw:commentRss>
		<slash:comments>80</slash:comments>
		</item>
		<item>
		<title>Newzbin2 Uses TOR To Kill Domain Blocking Before It Even Happens</title>
		<link>https://torrentfreak.com/newzbin-uses-tor-to-stop-domain-blocking-before-it-even-happens-110327/</link>
		<comments>https://torrentfreak.com/newzbin-uses-tor-to-stop-domain-blocking-before-it-even-happens-110327/#comments</comments>
		<pubDate>Sun, 27 Mar 2011 18:09:11 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[DRM and Other Evil]]></category>
		<category><![CDATA[newzbin]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=33114</guid>
		<description><![CDATA[Last year the MPAA took legal action against UK ISP BT in an attempt to force it to block the domain of Usenet indexing site Newzbin2. While the government and its communications watchdog run around trying to find out if effective site blocking is feasible, Newzbin2 have just taken steps to neutralize it before it even happens.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/newzbin.jpg" align="right" alt="newzbin">As <a href="http://torrentfreak.com/100-domains-on-movie-and-music-industry-website-blocking-wishlist-110322/">revealed</a> earlier this week, rightsholders from the music and movie industries have identified 100 &#8220;copyright infringing&#8221; websites which in their ideal world would be blocked at ISP level.</p>
<p>However, if website blocking should prove ineffective at reducing infringement these requests would become pointless even if authorized. So, to ascertain the effectiveness of blocking, Secretary of State for Culture Jeremy Hunt asked communications watchdog Ofcom to look into the matter and report back by spring.</p>
<p>But as the wheels and processes slowly turn, <a href="http://torrentfreak.com/stop-uk-website-blocking-say-open-rights-group-110326/">accompanied by calls</a> from the Open Rights Group for citizens to challenge the proposals, those unencumbered by layers of bureaucracy are acting quickly.</p>
<p>As widely predicted, a way around website blocking has been found quicker than it has even been assessed, let alone implemented. First up, one the MPAA&#8217;s primary blocking targets &#8211; Usenet indexing site Newzbin2.</p>
<p>&#8220;Since web blocking seems to be the new DRM for the Dirty Half Dozen and our name has featured high as a prospective victim of a domain name grab or a block, we thought we&#8217;d address the problem by the use of the free speech tool Tor,&#8221; Mr White from Newzbin2 told TorrentFreak today.</p>
<p>&#8220;We have set up a hidden Tor service accessible at http://sc3njt2i2j4fvqa3.onion,&#8221; he added.</p>
<p>Without going into huge amounts of detail, what Newzbin2 have done is set up what is known as a &#8216;hidden service&#8217; with the world-famous <a href="http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29">TOR</a> anonymity network. This means that by using the above URL with a <a href="http://www.torproject.org/projects/torbrowser.html.en">TOR-enabled browser</a>, anyone can access Newzbin2, even if its domain name is blocked or seized.</p>
<p>For those that don&#8217;t want to install TOR there is also another solution. By exchanging the .onion <a href="http://en.wikipedia.org/wiki/Pseudo-top-level_domain">pseudo-TLD</a> with tor2web.org (e.g http://sc3njt2i2j4fvqa3.<strong>tor2web.org</strong>), .onion URLs can be accessed from a normal browser with no addons whatsoever.</p>
<p>&#8220;By running a hidden service we make the MPA’s attempt to knock our name off the web entirely futile,&#8221; says Mr White.</p>
<p>&#8220;Newzbin2: 1 Stupids: 0,&#8221; he concludes.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/newzbin-uses-tor-to-stop-domain-blocking-before-it-even-happens-110327/feed/</wfw:commentRss>
		<slash:comments>120</slash:comments>
		</item>
		<item>
		<title>How To Deal With ISPs That Block Tracker Connections</title>
		<link>https://torrentfreak.com/how-to-deal-with-isps-that-block-tracker-connections/</link>
		<comments>https://torrentfreak.com/how-to-deal-with-isps-that-block-tracker-connections/#comments</comments>
		<pubDate>Sun, 16 Jan 2011 06:13:38 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[Bits]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=30518</guid>
		<description><![CDATA[Although it&#8217;s rare, some ISPs actually prevent customers from contacting BitTorrent trackers. A good and free way to circumvent this is to use TOR, just remember not to run any BitTorrent transfers over it. &#8220;There are several ways of contacting web addresses you’re not allowed to contact: using a web-based site like HideMyAss.com, or similar [&#8230;]<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Although it&#8217;s rare, some ISPs actually prevent customers from contacting BitTorrent trackers. A good and free way to circumvent this is to use TOR, just remember not to run any BitTorrent transfers over it. </p>
<p>&#8220;There are several ways of contacting web addresses you’re not allowed to contact: using a web-based site like HideMyAss.com, or similar services. Configuring your Bittorrent client to use a web-based proxy is often not easy or impossible. That’s why we’ll turn to TOR.&#8221;</p>
<p>(<a href="http://baert.ulyssis.be/2010/12/22/dealing-with-bittorrent-traffic-shapingblocking-by-your-isp/">more here</a>)</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/how-to-deal-with-isps-that-block-tracker-connections/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Free Anonymous BitTorrent Becomes Reality With BitBlinder</title>
		<link>https://torrentfreak.com/free-anonymous-bittorrent-becomes-reality-with-bitblinder-090611/</link>
		<comments>https://torrentfreak.com/free-anonymous-bittorrent-becomes-reality-with-bitblinder-090611/#comments</comments>
		<pubDate>Thu, 11 Jun 2009 16:46:35 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[BitBlinder]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=14106</guid>
		<description><![CDATA[There can be little doubt that the provision of an effective and free service for BitTorrent anonymity would prove hugely popular. Today we bring you a detailed report on BitBlinder - a brand new open source project which promises to cloak your torrents, hide your browsing and get round many obstructive filters.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Update:</strong> BitBlinder is no more but TorrentPrivacy currently has a limited <strong>free trial</strong> <a href="http://www.torrentprivacy.com/?id=tf">available here</a>.</p>
<p>A question which regularly pops up in the TorrentFreak mailbox is &#8220;How do hide myself online? How can I get free anonymous BitTorrent?&#8221; Our answer is usually something along the lines of &#8220;Free anonymous BitTorrent isn&#8217;t really a reality right now. You could use TOR but please, please don&#8217;t. It&#8217;s slow and really, the people who run TOR do not want it flooded with torrent traffic. Your best option is to use a VPN service, but this will cost you a few bucks.&#8221;</p>
<p>Maybe, just maybe, in future our answers will be different. Allow us to introduce BitBlinder, a new and free cross-platform (Mac support coming soon) open source project which not only claims to make anonymous BitTorrent transfers a reality but also hides your IP address while browsing the web. Its functionality also extends to the bypassing of some web filters and in the future will be compatible with more applications, such as email, IRC and instant messaging clients.</p>
<p><img src="http://torrentfreak.com/images/bitblinderlogo.jpg" alt="BitBlinderLogo"></p>
<p>Although anonymity with the previously-mentioned <a href="http://en.wikipedia.org/wiki/Tor_(anonymity_network)">TOR</a> is good, using it for torrents is a big no &#8211; it&#8217;s too slow and the operators of the network do not appreciate it. BitBlinder was born to solve the problems that TOR couldn&#8217;t. TorrentFreak caught up with Josh Albrecht, one of the creators of BitBlinder, for the lowdown.</p>
<p>&#8220;BitBlinder is an attempt to address the aforementioned issues with Tor &#8211; we want to make online anonymity fast, usable, and ubiquitous to the point that organizations give up on spying and filtering us,&#8221; Josh told TorrentFreak. &#8220;BitBlinder is actually built on much of the same technology as Tor, though we have a completely separate network.&#8221; </p>
<p>The anonymity itself is provided by BitBlinder&#8217;s own P2P network, inside which everyone is required to contribute their own bandwidth to proxy other users&#8217; data. The diagram below shows a standard user setup, without anonymity;</p>
<p><img src="http://torrentfreak.com/images/bitblinder1.jpg" alt="Without BitBlinder"></p>
<p>As seen in the diagram below, your request for data using BitBlinder is passed encrypted through multiple peers. Each peer in the chain only knows the IP address of the next person in the chain, not the original requester/sender.</p>
<p><img src="http://torrentfreak.com/images/bitblinder2.jpg" alt="With BitBlinder"></p>
<p>Since decent BitTorrent-capable anonymity services cost money these days, how can BitBlinder offer the same for free? The key is to think of it as operating a little like a private BitTorrent tracker.</p>
<p>In order to maintain a good ratio on a private tracker, at a minimum you need to upload the same amount of data as you downloaded. With BitBlinder there is a similar system &#8211; in order to get the service for free you have to proxy X GB of data for other people inside the swarm if you want to share X GB of anonymized data. In common with some new accounts on private trackers, BitBlinder accounts come pre-loaded with some free credit to get the user going &#8211; 2GB to be precise. If anyone prefers not to be bound by ratio rules in the future, just like on many private trackers it will also be possible to buy &#8216;upload credit&#8217; to use BitBlinder, but there is no reason why people can&#8217;t use it for free, as long as they share their bandwidth as detailed above.</p>
<p>At this point some readers will be asking how it&#8217;s possible for no-one to know what&#8217;s going on inside the BitBlinder swarm, yet somehow BitBlinder manages anonymity ratio tracking. It is possible though, and for those interested to learn about the micro-payment system BitBlinder&#8217;s is based on, further (highly technical) reading can be found <a href="http://cs.gmu.edu/~astavrou/research/Par_PET_2008.pdf">here</a> (pdf).</p>
<p>Of course, since traffic is sent from your PC to others in the BitBlinder swarm before reaching its destination in order to anonymize it, it won&#8217;t be as quick as regular non-anonymous BitTorrent use, but Josh told us speeds should be respectable and in any event, much faster than TOR. Indeed, within a few seconds of starting a &#8216;Steal This Film&#8217; torrent from The Pirate Bay, we experienced speeds in excess of 2Mbit/s, which is massively faster than my previous experiences of BitTorrent over TOR.</p>
<p>For Windows users the BitBlinder package comes in a 17mb installer. The torrent client is a custom version of BitTornado and although it doesn&#8217;t have all the features of say uTorrent, more features will be added as time goes by. The bundled anonymous browser is naturally built on Firefox.</p>
<p>Josh told us that the BitBlinder network could be made to work with uTorrent or another browser such as Internet Explorer but unfortunately both applications are closed source, which means that it&#8217;s impossible to be certain that all data will be sent through other users (proxies) in the BitBlinder swarm and not directly to the Internet. For the same reasons, Flash is unavailable in the bundled version of Firefox.</p>
<p>Another trick up BitBlinder&#8217;s sleeve is the development of techniques to bypass web filters.</p>
<p>&#8220;BitTorrent encryption is pretty good at avoiding ISP level restrictions but it doesn&#8217;t do much for things like avoiding university or corporate firewalls. One of Tor&#8217;s goals is to circumvent the Great Firewall of China and we hope to make BitBlinder even better,&#8221; explained Josh. &#8220;Filters generally work by either blocking ports, a certain IP address, or by inspecting the traffic itself for specific protocols. We&#8217;re working hard to make BitBlinder effective against all three of these methods, but we still have some work to do on these features, so results may vary.&#8221;</p>
<p>Since BitBlinder has an anonymous browser, it should prove useful if you don&#8217;t want your employer knowing what you&#8217;re doing on Facebook or other social networks, for example. Indeed, if these sites are blocked it&#8217;s possible to use the BitBlinder network to access them. Of course, the anonymity would also be useful for signing up to and using the HTTP element of a torrent site.</p>
<p>Inevitably there are some issues with an anonymity system such as BitBlinder, and they parallel those experienced by users of TOR. Any traffic generated inside the BitBlinder network eventually needs to escape to the wider Internet. In order to facilitate this, some users need to act as an exit point. In basic terms, this means that an exit node operator&#8217;s IP address will be associated with the traffic leaving the network.</p>
<p>Before panic sets in, this is not necessarily bad news. Acting as an exit node provides the operator with plausible deniability, since they will have no idea what data is passing through. It would also be difficult to say if the data leaving that PC had originated from there or elsewhere, extending the deniability of their own traffic too. And it&#8217;s not as if that user&#8217;s IP address wasn&#8217;t perfectly visible already before BitBlinder came along.</p>
<p>For most users, however, opting to act as a beginning or middle proxy in the BitBlinder network means that no-one outside can see any traffic emanating from their PC and the good news is that this internal traffic still adds upload/download credit to the user&#8217;s account.</p>
<p>Time will tell if BitBlinder lives up to its dreams (and everyone else&#8217;s) but from what we&#8217;ve seen so far in the beta version, things are looking very promising indeed. That said, remember folks this is a beta and it is likely people will uncover bugs so please be patient and consider allowing the app to send crash reports, it will help the team a lot.</p>
<p>BitBlinder can be downloaded <a href="http://www.bitblinder.com">here</a> &#8211; don&#8217;t forget to <a href="https://www.bitblinder.com/download/register/">register</a> and please read the instructions on how to <a href="https://www.bitblinder.com/learn/faq/#forward">forward ports</a> etc, it will be good for your ratio.</p>
<p><em>New users should note that invite codes will be sent out at a controlled rate. Early adopters will be able to register fairly quickly but as more and more people apply, the longer the wait will become. This is merely to ensure a healthy network with an adequate number of quality proxies.</em></p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/free-anonymous-bittorrent-becomes-reality-with-bitblinder-090611/feed/</wfw:commentRss>
		<slash:comments>139</slash:comments>
		</item>
	</channel>
</rss>
