• simsym
    link
    4
    edit-2
    1 year ago

    Sorry but this just isn’t really correct and assumes the ISP puts in a lot of work to track people down.

    They are not the ones enforcing DMCAs from illegal content. That is performed by cybersecurity companies that crawl through IPs in seed swarms and then report that automatically to the ISP if it registered within their IP range. This is a page from one of those companies advertising this service. You can see the report that Comcast gives out and it sites who reported the violation.

    Also, yes a lot of VPNs do actually remove logs. Can’t report to authorities what you do not have, although some areas do have retention logs which is why you should be using a VPN service that hosts a server in a country that doesn’t care about that (I point mine to Canada depending on ping and that works for me). Lots of VPN services have third-party audits to confirm their privacy statements, and I utilize one that has no information on me besides the email I signed up with (and could use cash/crypto payments if I would like for extra anonymity).

    Also, there are sites that check for IP leaks like this one which can confirm you are showing only the VPN IP address. As for the port issue, they also allow for port forwarding on a lot of VPN servers so you don’t need to be utilizing any ports directly to your connection, only to the server and then gets forwarded to a WireGuard port to finalize the connection.

    I have torrented absolutely astounding amounts of data with my VPN active and have had zero issues. Then, the moment I accidentally disable the VPN for one reason or another and keep my torrents active, I received a DMCA for two torrents I was running at nearly the exact time I disabled my VPN connection.

    • bunkrra
      link
      fedilink
      -11 year ago

      thanks for link, maybe i will send them my cv 😃, isp is not the one who is doing investigation, they just coop.

      Do VPNs remove logs? do you have access to the log folders on the machines, or how do you know? im not gonna argue with anyone, its my personal opinion, do what ever you want to, if you think they are not loggin pls do so.

      so you receveid the dmca and what happend? you had to pay? or it was just no no no and thas it? ypu had zero issues couse of you hid yourself so good or cause you are not a big fish to hunt, or to give an effort to pit you down for such a small data?

      im not saying that you did bad, im just sayimg that this got multiple options how to look on the matter, even if you will not care at all and seed alot, they dont need to put you down, or vice versa, one seed with best harfening amd they will make a big problem out of it.

      • simsym
        link
        31 year ago

        You know they dump logs because like I said they employ third-party contractors to come in and perform security audits that validate their privacy policy, which if you do proper research should include dumping of logs, or only minimal data retention (like how mine only required an email address) along with dumping. So you can confirm it, I guess you can still be weary of that if you’d like but it is in their best interest to make sure you are actually safe, otherwise that is a hit on their reputation.

        As for what happened after receiving a DMCA, they tell you that you have so many strikes on your account and that if you violate that a certain amount of times within a time period, then they will terminate your service. The ISP is not the person who would be pursuing you, their only liability is that you don’t do illegal things on their network.

        But again, all these steps beyond just a VPN are to ensure there is as little identifying information as possible so they can’t track you down. Unless you are a literal Scene person who is doing the actual dumping and uploading of content, no one is out here watching you unless you leave easily identifiable information public while torrenting, at least this has been my experience after torrenting probably 100s of TBs of data both via seeding and leeching.