Even the site that considered safe in the megathread, there’s report of malware and trojan and I don’t know what site to use
Even the site that considered safe in the megathread, there’s report of malware and trojan and I don’t know what site to use
Simple, trust no one. Get a no-reported-logs VPN, don’t download anything that has a strange file size or extension, look at comments, look at the number of seeders if it’s a torrent. If you can, join something like a private tracker where there’s moderation too. If it walks like a duck and quacks like a duck then it’s probably not the movie you were looking for and there might be a Trojan army inside waiting for you to let the duck enter your computer… That metaphor may have fallen apart on me…
I know they’re an army in this metaphor but I still want to hug them.
VPN providers don’t protect you from malware.
I was trying to give general advice, since it didn’t sound like they had a trusted private tracker already it’s a good idea to have a VPN to mask your IP. I agree, it probably won’t help against malware.
Most come with DNS blocklists now that can prevent you from accessing it
DNS blacklists also don’t protect you from most malware.
It’s part of defense in depth. No single piece will protect you from everything, so you you use multiple layers of protection.
I can’t call DNS blacklists part of defense in depth. DNS blacklists are a poor man’s version of existing and pre-installed anti-malware software.
They’re completely bypassable, they boast a high false positive rate due to how threat actors host malware, and they don’t even block newer malware. Just use Windows Defender. It ain’t perfect, but it’s leagues better than any DNS blacklist.
Number one above, stopping the connection before it happens, is really the best benefit, in my opinion. And if they boast a high false positive, you need better lists. You keep saying “they don’t block this or block that.” They are (nothing is) a one stop shop. Simply because they don’t block what you’re cherry picking does not make them bad. Use multiple layers. You say “don’t use a blocklist, use MS Defender instead.” Why not use both the blocklist, MS Defender, and even more stuff? Multiple layers. Defense in depth.
Because Defender already covers what DNS blacklists block and more with less false positives and a proper way to manage exceptions for non-technical people. Older malware is a solved problem for Defender since it’s literally pre-installed everywhere. VPN providers don’t have a way to manage DNS blacklist exceptions, so have fun disabling your VPN to do any research. You also don’t get to choose the blacklists your VPN provider uses. Saying 3. is not a point is like saying malware that’s always able to bypass your anti-malware solution is irrelevant.
lol there is no such thing. use tor
Piracy using TOR is extremely slow and not really anonymous
maybe 5 years ago
Slowness and bandwith limitations are still an issue and it’s likely that they will always be. It’s already too slow to torrent large files over Tor and it also takes away the bandwith of other users. Tor also still doesn’t support UDP connections, which may cause data leaks.
Don’t torrent over tor, its nodes should be used for more important things than piracy
you do not have to use exit nodes. you can p2p with other tor users. piracy imo is important due to the censorship that countries can have on legitimate content.
Regarding your last point, I agree, however it is not as important and it does take up resources that could otherwise be used for the people who need it (journalists utilizing tor, victims trying to get away from abusers etc).
Especially given that there are still alternatives to piracy without tor, whereas there are far fewer alternatives for these people.
That said, you’re still right, it’s minimal. Overall though, options for piracy without tor are accessible and should still be used when possible. From my understanding, few circumstances arise where pirating over tor is a better method for you and for others
Basically, use tor for legitimate content to help make tor safer for others using it.
For p2p it is better to use i2p, not tor
yeah completely agree although it is even more niche
I added the word “reported” because I don’t trust VPN providers to not keep logs, but ideally they should report that they don’t keep logs and have an established history of not providing logs. Tor is really not ideal if you’re trying to download anything large and you’re still vulnerable depending on who controls the exit nodes.
Mullvad I think is very good for this. They have an extensive description of their no-logs policy on their site, and have also been raided by the police before, who apparently were unable to find any customer information.
Shenanigans are always possible of course so you shouldn’t 100% blindly trust anyone, but all the available evidence seems to point to them being pretty legit IMO.
You can’t trust VPN providers to store no logs. It’s impossible to verify. I don’t get why people downvote this comment.
From what are you protecting yourself? Piracy? Then go with a VPN that has been tested in court and didn’t turn over any logs. The second one of these providers turns over their logs in court they are out of business because no one will ever trust them again. That’s all you really need for the seven seas.
Can the NSA see what you’re doing? Who cares. If they can, they aren’t revealing that to help anyone in a civil case.
You conflate VPN providers have an incentive to store no logs with it’s impossible to verify whether VPN providers store logs. It’s like trusting your friend to keep a secret. They promise not to write down what you say, but you can’t be sure. You accept that risk in your threat model, and that’s fine. But newcomers should judge that risk themselves. I feel like “Don’t worry bro, they don’t keep logs.” is an inappropriate response to people that’re about to commit a crime that can land them in jail.