this post was submitted on 06 Jul 2023
65 points (100.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

52591 readers
744 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] QuikxSpec@lemmy.world 2 points 1 year ago (1 children)

Could you elaborate? Never heard of this aspect

[–] jws_shadotak@lemmy.world 2 points 1 year ago (1 children)

If you forward a port on your network (or VPN) and point your torrent software towards that port, you are now an "active" node. You can communicate with anyone else, forwarded or not.

If you leave it closed (passive node), you can only communicate with active nodes. With large torrents, this isn't an issue because there's more than enough active nodes to send the data.

Port forwarded: talk to anyone, even closed
Port closed: only talk to port forwarded people and hope that small torrents have someone with a forwarded port.

[–] QuikxSpec@lemmy.world 2 points 1 year ago (1 children)

Thank you. Does this create any considerable vulnerabilities?

[–] jws_shadotak@lemmy.world 1 points 1 year ago (1 children)

Not typically but it can vary depending on which protocol and which provider you use. Best to check yourself using something like ipleak.net and see if there's any identifying info on there while you're connected.

[–] QuikxSpec@lemmy.world 1 points 1 year ago

That’s great. I’ll do some more research on the hardware I have also