Skip to main content

Anonymous P2P File Sharing

If you came to this post looking for P2P file sharing programs that works through TOR anonymity network then you are in the right place, TOR was made for anonymous browsing and it's not even fast enough for browsing nowadays so imagine downloading something using it or seeding files.
The good news! it's still possible but it would be better to make your P2P connections without TOR.

If you are planning to download some pirated programs or illegal materials then please consider the risk, I advice you to stay away from that, and use TOR for privacy reasons only.

Without Tor

Yep VPN is as secure as TOR but of course it's not anonymous as much as TOR, the VPN company can give away information about you to any authorities so if you are doing nothing wrong then don't worry, and make sure to read their terms of service,  I would go for a paid service that keeps no logs.

Emule Protocol Obfuscation

You can use Emule and enable this feature in Options > Security, it should make any P2P connections unreadable and hidden. 
rotocol Obfuscation is a feature which causes eMule to obfuscate or "hide" its protocol when communicating with other clients or servers. Without obfuscation, each eMule communication has a given structure which can be easily recognized and identified as an eMule packet by any observer. If this feature is turned on, the whole eMule communication appears like random data on the first look and an automatic identification is no longer easily possible. This helps against situations were the eMule Protocol is unjustly discriminated or even completely blocked from a network by identifying its packets.
It is however important to note what Obfuscation is not intended to do: It will not increase your anonymity, it will not make you "invisible" in any way and it will also not protect you effective against eavesdroppers. Also if your network admin has a good legal reason to block eMule (for example a restricted company network), bypassing it may cause you other unwanted consequences.
Obfuscation is currently available for ED2k TCP and UDP, Server TCP and UDP and Kad TCP communication. Kad UDP packets are not yet obfuscatable.

Make Sure Your Torrent Connections Are Always Encrypted

If you are using client like uTorrent then you can encrypt the connection using Options > Connection Settings.
also consider:

Using TOR with P2P programs

Apparently every P2P client, torrent etc have a proxy setting page, you can input your TOR settings aka "localhost" and port, but the speed will be extremely slow that if you could connect and it may not work with some programs and protocols, the main reason for TOR is HTTP requests and that is the reason TOR was made, so make sure to read the following.

That's all for now, and this is why everyone will tell you Darknet, aka TOR network or any other anonymous network was not made for P2P, until the day that there will be a strong P2P anonymous network.

[Update] Check this website too I think it's related but have no time to go through it, looks promising tho 


Popular posts from this blog

Tria Mera - 666 - The truth

Following is a reference to the movie white noise, what you see on this page is not my opinion, and I am not interested on this stuff, if you come here than you are probably searching after watching the movie or researching tria mera term, this is for educational purposes only.

The expression, Third Day, appears in several narratives in the Bible. (Occasionally, it is “three days.”) Some biblical interpreters have thought that some of these third day motifs have significance by signifying a certain divine principle, and a few interpreters have thought that they are cryptic in meaning. Why? Interestingly, these narratives record some of the most important events in the history of Israel. And surprisingly, except for the Bible’s mention of the third day, the seventh day, and its account of creation in Genesis 1, the Bible rarely mentions the other days of the week.
The Number of the Beast is described in the Book of Revelation 13:18. From the King James translation:[5]
Here is wisdom. L…

How to Access Satellite Internet for Free

Before you start, please note that sniffing data is highly illegal, and the below is a tutorial so you understand how it works, there is no other reference in English that goes in depth except this page, therefore you need to link back in case you used this content on any medium.
I held no responsibility what so ever if you use the below in other purposes that is not educational or testing.

For a long time satellite internet is the right solution for people in remote locations, such as forests, desert, islands and more deep far locations.

Even after the huge expansion of internet to most of the inhabited remote locations there are still people who uses satellite internet for different reasons, as it cannot be disrupted by your government, it is portable, just take your dish and decoder with you to your new home as long as the satellite you subscribed in is covering your new area as well.

Now about free access to this internet, it's around you everywhere, all you need is the right …

How to Fix Ghost Touches on any Tablet / Phone - Aka Touch Glitch

A DIY on how to fix any tablet or phone touch screen, no matter if it's android or windows this fix should work, most of the times ghost touch or phantom touches are caused by over heat and grounding issues, so instead of tweaking the software which didn't work for you for ages get your tools and watch this video! it's really simple and needs no technical knowledge.