PDA

View Full Version : BitTorrent VPN Guide for n00bs



Expeto
04-14-2010, 07:43 AM
Skip first parts if you don't want to learn about details of the VPN, skip to next blue to learn about how to configure securely

What is VPN
You can get detailed info about Virtual Private Networks from wiki page (http://en.wikipedia.org/wiki/Virtual_private_network)
Basically its something that hides your IP by using a surrogate IP.

Why do you need VPN?
To understand why you need VPN you need to know how does Internet works, Internet works with IP addresses. IP address are like home addresses, every computer have a unique IP address. To transfer data(mp3,gifs,jpegs,texts,anything) from a computer to another, both computers have to know each others unique IP numbers.

It basically works like this(postal analogy);
When computer A sends an mp3 to computer B.
1 - A sends an letter to B's unique IP address and tell that he wants send something.
2 - B confirms this transfer by a reply
3 - A starts sending the packages to B.
4 - B sends confirmations of received packages
5 - If which no confirmation returns from B, A re-sends that package again.

As you can see both of them need to know each other's IP for transfer to work. When you send a mp3 your computer sends it piece by piece, usually hundreds of pieces. If you ship hundreds of small packages at least few of them will be lost on the way.
That is why the computer B needs to know IP of A. B sends confirmations for incoming packages so that A knows which packages arrived and resends the missing packages.

Bittorent work alike, but you initially don't know which persons want to receive from you and which persons can send to you. The torrent trackers are like a dating service for seeders and leechers. Trackers knows the IP numbers of everybody who downloading or uploading that torrent.

At uTorrent as , at beginning there nobody a peers page. You don't know anybody's address, so you can't send or receive anything.
http://img340.imageshack.us/img340/8062/nopeers.jpg (http://img340.imageshack.us/i/nopeers.jpg/)

than uTorrent connects the tracker, tracker starts to giving IP numbers of other users downloading or seeding this torrents. Now utorrent knows addresses and requests them to send files to. You can notice download started at speed of 0.3 kB/s
http://img444.imageshack.us/img444/4259/somepeers.jpg (http://img444.imageshack.us/i/somepeers.jpg/)

After few seconds uTorrent got IP numbers of more people who have this torrent active in their own client. Now speed is 12kB/s because utorrent knows more IP addresses and asked them to send the parts of this file. Many of them are sending the file to me. In time more of them start to send to me and speed will increase.
http://img69.imageshack.us/img69/5871/peers.jpg (http://img69.imageshack.us/i/peers.jpg/)
uTorrent builds its own small temporary address book which keep updating itself

uTorrent also have some tricks of his own, like DHT or Peer Exchange, which is like giving your own address book info to a fellow downloader and getting his address book info in return.

You might wonder what is wrong with this.
As you can see any client knows IP addresses of almost everybody who have this torrent active, so anti-piracy also can know about them.

But the trackers also have few tricks of their own, which protects their users, some trackers adds fake IP addresses to swarm, there are some traps on the Internet which adds people to trackers without even informing them.(bit like rickrolls or finding yourself friending some guy you never knew) You can watch a video and get your IP added to a swarm of tracker. This is not a very bad thing for victim, its a good thing for users of the tracker.

Because some of the people in the list didn't actually downloading or uploading the torrent, its way too hard to make a lawsuit.
a.k.a. "Plausible deniability (http://en.wikipedia.org/wiki/Plausible_deniability)"

Some of you might received threat letters[more info on threat letters (http://beingthreatened.yolasite.com/)] from copyright gangs. They basically collect the IP addresses make a list from them and they prepare a letter. Than they make a request to your ISP(the company you pay for the Internet connection) with this list and Internet Service Provider redirects this letters to everyone in this list. Usually this gangs don't even know your real mail address when they send a threat, so its usually safe to ignore their threats. If they had enough hard proof they would already made a real lawsuit. You are "Innocent Unless Proven Guilty". They are more like spammers, trying scam you.There are actually companies build to cash in the pirate

But there are people who knows your IP address and what you downloaded, with a court order they can find your home address and real name. Who knows maybe one of the new laws will allow this people to build a real lawsuit.

You might also don't like that other people can see what you are downloading (like downloading sick porns or worse (http://thepiratebay.org/torrent/5637784/Justin_Bieber_ft.Usher_-_Somebody_To_Love_%28Remix.2010%29__JB59))

Also there are also some ISP's are blocking, throttling BT users connection(slowing your speeds).

VPN solves all of these problems

How Does VPN works/solves this problems?
The trick of VPN is to use a surrogate.
When Computer A from UK using ipredator VPN sends something to Computer B, it happens like this;
1 - Comp A encrypts its message and send something to Comp ipredator(VPN server).(Its called something because nobody can really know what it is, other than the sender. Its encrypted. Not even ISP can see what is this thing, not even the government.)
2- When this something reaches to "Comp ipredator"(a computer in Sweden in this case), your something gets decrypted and becomes something meaningful
3 - Than "Comp ipredator" redirects your message to computer B.
4 - Computer B responds, but computer B doesn't know the IP of computer A.The message came from Comp ipredator, somewhere in Sweden. So Comp B responds the Comp ipredator.
5 - Comp ipredator encrypts the response and sends it back to Comp A.
6 - Comp A decrypts that something. Now computer A knows the respond of B. Now A can start sending files to B over VPN.

http://www.vpnuser.com/gfx/vpn.gif

It is basically like a sending a letter in a closed box, You type address of Comp B on the letter, you type the address of Comp ipredator to the box. Only thing Comp ipredator does, is open the box and send the letter, than send the responses to the this letter in another box back to you. Of course in VPN that box is a 128bit encryption capsule. Which not uncrackable but it takes too long to crack.

Same thing for bittorrent, you can seed or leech by your surrogate, but the moment you close your VPN, nobody can connect you anymore. Like burning the bridge

Also your ratio wont increase or decrease on VPN unless you login your tracker using your VPN every time.

Also another good trick of VPN, when you reached your rapidshare free user limit, just click reconnect of your VPN. Now you can download files again. Rapid does not know you were the guy who just downloaded another file few second ago.

If you are heavy on rapidshare and etc, you can make a one click reconnect button by opening a new .txt file, and typing

rasdial [your VPN connection name here] /disconnect
rasphone -d [your VPN connection name here]
into your file. Than change file extension from .txt to .bat and click it when you want a new IP.

USENET and Proxy?
Using "usenet" instead of torrents, will fix most of the privacy problems. Its less under attack than torrent trackers, it hard to track when you got a good provider which offers strong SSL. But keep in mind, providers keep logs and records.

Proxy works exactly like VPN. Unlike proxy, when you setup a VPN, every bit of your internet connection will be encrypted and will be going through the VPN tunnel. Proxy is more software based, for example when you set proxy for firefox, msn and utorrent won't be effected. It offers versatility and flexibility, but VPN is usually easier to manage and no extra software is needed for VPN. Not every software support proxy.

How to build a secure VPN configuration
First have a VPN working, in case of ipredator try this guide (https://www.ipredator.se/faq/guides/connectionvista/). All vpn providers have their guides like this

Follow these simple steps to install Ipredator on your computer using the PPTP protocol.
(This instruction apples to the operative system Microsoft Windows XP).

1. Click Start menu, Settings, Control Panel.
2. Choose Network and Internet Connections.
3. Click on "Create a connection to the network at your workplace".
4. Select Virtual Private Network connection (VPN). Click Next.
5. Enter a name for your VPN [this is the name you should insert to the rapidshare reconnect button] . Click Next.
6. Enter "vpn.ipredator.se" as "Host name or IP address". Click Next.
7. Select "My use only" if you want this connection to apply only to your user on the computer. Select "Anyone's use" if you want this connection to apply to all users. Click Next.
8. Check "Add a shortcut to this connection to my desktop" if you want easy access to your Ipredator-service.
9. Click Finish.
10. You should now disable "File and Printer Sharing" as it can pose as a security issue.[THIS IS TOO IMPORTANT, SOME VPN PROVIDERS FORGETS TO MENTION THIS IN THEIR GUIDES]
11. Right click on the newly created Ipredator connection and choose "Properties"
12. Click on the "Network" tab and uncheck the "File and Printer Sharing for Microsoft Networks".
13. Click OK.
14. To use double click the connection.
When you got you VPN working, it automatically hides your IP in everything, including firefox,uTorrent,e-donkey,MSN. You might notice when you login your facebook, its asks for you birthday. Other sites might ask stuff like this. This because they think they you are now in another country.

The problem is every VPN, even the best, disconnects sometimes. When disconnected uTorrent will keep working and LEAK your real IP to other people.

So you need to stop uTorrent from working without VPN, there are few ways to do this

VPNetMon
http://i.i.com.com/cnwk.1d/i/tim/2009/10/28/129853_257x193.jpg
This is not a very known trick, but its effective and easy. But it is not very good for your torrents. It dominates your uTorrent with an iron fist.
To use this freeware download it VPNetMon from CNET (http://download.cnet.com/VPNetMon/3000-2162_4-10688111.html) and add uTorrent to the software, also don't forgot to check "(re)start application .....".
It will kill the application the moment VPN disconnects, it doesn't closes the app, it really kills it instantly. uTorrent might need recheck the files after this.

NOT: does not supports win7, which was not on the market when this guide was written.

COMODO
http://t0.gstatic.com/images?q=tbn:BKQAZAx2snG7xM:/url?source=imgres&ct=tbn&q=http://media.techworld.com/cmsdata/products/3212502/Comodo%20Firewall.jpg
Comodo is a one hell of a software to keep your computer secure. It's the a software that can even satisfy the needs of most paranoid people. It also can allow, deny connections. Basically go to Firewall->Advanced->Network Security Policy and add few rules under uTorrent to block all connections except the one with your VPN. Remember? You data goes to VPN first, than the target. So tell comodo to block anything does not goes to the VPN.

Using the uTorrent advanced configs(hard way)
Keeping in mind this is a tutorial for n00bs I'm not going to explain how this is done.
try; http://forum.utorrent.com/viewtopic.php?pid=467308
but chances are likely you are gonna screw your uTorrent, so backup, backup and backup!

Using the IP tables (http://filesharingtalk.com/threads/406977-Securing-VPN-with-routing-tables-the-easier-way)


>>Test your configuration
http://checkmytorrentip.com/ is a very good service that does the checking for you.

Checking your ip address with a web browser may not help you in the long run for many reasons. For example, you can't check your IP continuously and your torrent software may use a different connection (proxy, firewall, routes, etc.) On private trackers, your IP address is an important identifier. If you're accessing the tracker from too many IP addresses, or if your IP address has been previously used by a cheater/spammer, you may face repercussions.

The following steps explain how to check your torrent IP address using http://checkmytorrentip.com.

1. Generate a tracking torrent at http://checkmytorrentip.com. The torrent created will have a private passkey attached.

2. Load it into your torrent client and start downloading it. There will be no seeders or peers so you won't download anything else.

3. Your current IP will show up in the status window of your bittorrent tool:

http://checkmytorrentip.com/images/sampleIPclient.png

4. Your torrent client will update its IP every minute and you can visit the site again to see your IP history. It'll look like the following:

http://checkmytorrentip.com/images/sampleReport.png

The IP history above will be the same for all the trackers active in your torrent client so you can use this to ensure the correct IP is being used.
You just download a unique torrent from them, and they try to track you. Add their torrent to your uTorrent, make sure to Force Start it, leave your computer and uTorrent open for a day. You can download stuff while waiting. After a day go to the website and click "check my IP" you will a see a list like this
http://img21.imageshack.us/img21/6899/samplereport.png
of course after a whole day, your list will be longer. Even if you can see the name of your real country even once in that list, your IP is leaking. If your IP isn't leaking you will just the name of country you bought the IP. If you bough from ipredator you will just see Sweden IP's.
Don't forgot to check their FAQ pages, you can also find lots of info in this website about securing your IP.
You can also find few other ways to stop leakage.

How important is the provider
Way too Important!, when using VPN your government or ISP cannot see what you are doing but your VPN provider can see. You need somebody you can trust. This is actually why I choose ipredator a service of piratebay. The thing about piratebay.org if they wanted to track us, they could have done it.

If you want to test VPN for free, try itshidden, but free users get disconnected every 20min. Which also can be ultimate leak test for your config :)


Original Post 04-14-10
Revised ; 15/01/11
Revised ; 15/12/11



63914 (http://www.kopimi.com/kopimi/)

anon
04-14-2010, 02:04 PM
I think it'd be nice if you concealed the IPs in your uTorrent screenshots.

And good that you mentioned CheckMyTorrentIP - they have a mini-tutorial to ensure your real address isn't leaked if the VPN disconnects, achieved via routing tables.

ca_aok
04-14-2010, 03:55 PM
Ugh I was hoping this was going to be a guide on setting up OpenVPN, which I've been having some issues with. Thanks anyway though :P

Expeto
04-14-2010, 07:55 PM
I also use routing tables trick, they are very effective.

the IPs in screenshots concealed.

ca_aok , which provider you are trying to use with openVPN? and what exactly is the problem? Maybe I can help, specially if you are a linux user.

ca_aok
04-14-2010, 10:51 PM
It's not a provider, it's a VPN server setup issue on a dedicated server. I can't seem to get internet connectivity working through bridged mode.

BeatleBoy
04-15-2010, 09:02 AM
I also use routing tables trick, they are very effective.

If you find it effective why don't you also explain how to do it

and how to do it with comodo isn't really helpfull, can you specify which rules I should add?

And a cons/pros for leakage preventing methods would be also appreciated

Expeto
04-15-2010, 11:39 AM
I also use routing tables trick, they are very effective.

If you find it effective why don't you also explain how to do it

and how to do it with comodo isn't really helpfull, can you specify which rules I should add?

And a cons/pros for leakage preventing methods would be also appreciated

I would add the pros/cons, but this a noob guide and playing the route tables isn't something a noob should to, the thing about screwing the route tables is, if you screw them up, you can't get any online help you can't even come here and curse me for tutorial.

but still I'm planning to add a new guide about the subject.

I would also add some more explanation about comodo



It's not a provider, it's a VPN server setup issue on a dedicated server. I can't seem to get internet connectivity working through bridged mode.

You didn't really gave me too much to work with

ca_aok
04-15-2010, 02:49 PM
Ok, take a look at this post then, it has pastebins of various stuff:

http://ovpnforum.com/viewtopic.php?f=4&t=3861

Expeto
04-15-2010, 03:09 PM
when you say "once it's connected I can no longer connect to the web", do you mean the server cannot connect to web or the client cannot connect to web by VPN?
It sound like server, but your server logs indicate you are also the client.

if you mean the client; in output there seems to something wrong with your tables, which might explain your problem

if you mean the server; wow, this is weird

Skiz
04-15-2010, 03:14 PM
Just FYI... There are still IPs in the last three images.

Expeto
04-15-2010, 03:45 PM
actually the IP's in last 2 images are fake IP's, the IP in third image is private network IP.

Still thanks for the heads up

ca_aok
04-15-2010, 04:26 PM
when you say "once it's connected I can no longer connect to the web", do you mean the server cannot connect to web or the client cannot connect to web by VPN?
It sound like server, but your server logs indicate you are also the client.

if you mean the client; in output there seems to something wrong with your tables, which might explain your problem

if you mean the server; wow, this is weird

The client can no longer connect to the web once it successfully connects to the server. As for it being an issue with iptables/routing, I have iptables disabled, the client computer has its firewall disabled and is set to DMZ mode through the router just to make damn sure that it's not a firewall problem.

The end goal is I want the client to tunnel all IP traffic through the server running OpenVPN.

Expeto
04-15-2010, 05:45 PM
I don't mean the IP tables, I mean the route table of windows, if you really managed to disable it, it must be the source, because VPN cannot work without routing tables, In a nice coincidence I just wrote a guide about IP tables (http://filesharingtalk.com/vb3/f-guides-and-tutorials-65/t-securing-vpn-with-routing-tables-the-easier-way-406977) today.

Here in your client output;

Sun Apr 04 22:42:33 2010 Route addition fallback to route.exe
The route addition failed: The object already exists.

Sun Apr 04 22:42:33 2010 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.30.31
Sun Apr 04 22:42:33 2010 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=98]
Sun Apr 04 22:42:33 2010 Route addition via IPAPI failed [adaptive]
Sun Apr 04 22:42:33 2010 Route addition fallback to route.exe
The route addition failed: The object already exists.

Sun Apr 04 22:42:33 2010 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.30.31
Sun Apr 04 22:42:33 2010 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=98]


OpenVPN cannot manage to fix your routing tables to redirect your traffic to openVPN server

Do a "netstat -R" in cmd and send me to output please. We might able to make a workaround to fix this. If we manage to do such a workaround, it will protect you for IP leaks, so it will better than new :)
but no promises for now, its just a theory.

Its not very private information but, if you have security concerns about sharing the output in a public board, you can PM me.

ca_aok
04-15-2010, 06:15 PM
Here's the routing tables with the VPN off:

http://img.photobucket.com/albums/v300/ca_aok/vpnoff.png

Here they are with the VPN on:

http://img.photobucket.com/albums/v300/ca_aok/vpnon.png

Notes: The 85.17.*.* is my server's external IP, and is static.

10.15.30.* is the internal network I've set up on the box in /etc/network/interfaces for my VPN.

10.15.30.101 was the address I was assigned when I connected to the VPN.

192.168.2.* is my home LAN IP subset, 192.168.2.10 is my computer on the LAN.

Thoughts?

Also: I don't need to set up routing so that traffic stops if the VPN drops, I want it set up so that traffic only goes through the VPN while the VPN is active.

Expeto
04-15-2010, 06:28 PM
OK, I just took a second look to your logs after getting rid of distractions it become little more clear



//here it sets gateways, your gateway for routing is 10.15.30.100
Sun Apr 04 22:42:25 2010 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 85.17.150.123,route-gateway10.15.30.31,ping 10,ping-restart 120,ifconfig 10.15.30.100 255.255.255.0'

//here it tells you default_gateway for route is 192.168.2.1
Sun Apr 04 22:42:25 2010 ROUTE default_gateway=192.168.2.1
//now it tells that gateways works(I guess)
Sun Apr 04 22:42:31 2010 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

//now with the real deal starts here, C:\WINDOWS\system32\route.exe ADD 85.*.*.* MASK 255.255.255.255 192.168.2.1 means, its adding a rule to your routing table, to redirect everything from 85.*.*.* for 192.168.2.1[your default local vpn route gateway IP]
Sun Apr 04 22:42:32 2010 C:\WINDOWS\system32\route.exe ADD 85.*.*.* MASK 255.255.255.255 192.168.2.1
//now it fails, because such a rule already exist
Sun Apr 04 22:42:33 2010 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=12]

//now it tries the redirect everything from 0.0.0.0 for 10.15.30.31. (0.0.0.0 means any IP address)
Sun Apr 04 22:42:33 2010 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.30.31
//fails again
Sun Apr 04 22:42:33 2010 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=98]

//another route attempt and another fail
Sun Apr 04 22:42:33 2010 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.30.31
Sun Apr 04 22:42:33 2010 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=98]
Sun Apr 04 22:42:33 2010 Route addition via IPAPI failed [adaptive]
Sun Apr 04 22:42:33 2010 Route addition fallback to route.exe
The route addition failed: The object already exists.



I'm kinda having information overload with this data, deduction is not easy on pictures and your win32-TAP interface definitely not helping

try "route -f" to rebuild your route tables while VPN off, restart computer after this.
also "netsh winsock reset" might do the trick
"IPConfig /renew" also another way to reset route tables.

if this doesn't solves,

try;

route delete 85.17. 192.168.2.1 while vpn is on

if this doesn't helps neither, try

"route add 85.*.*.*[your IP] MASK 255.255.255.255 192.168.2.1" while VPN is on


"route delete 0.0.0.0 192.168.2.1" while VPN is online, but be careful, because when you type this, you force your connection to go over VPN, your internet connection will either go over VPN or go nowhere.
Save "route add 0.0.0.0 mask 0.0.0.0 192.168.2.1 IF 2" into a text file, you will need this to disable the first command and get your computer working without VPN again.

if none works, use the first commands again to rebuild your tables once again...


let me know if none of them works, also ipconfig output might be helpful too

also if you can, try to connect your VPN from another computer, or maybe from an virtual machine.

good luck

digimon
04-16-2010, 08:31 AM
thanks for sharing this tutor really helpfull =)

cian1500ww
04-17-2010, 12:19 AM
Thanks for the tutorial. I keep getting an error when using vpnetmon, it says to download a newer version from an address but there's nothing at the address, any ideas ??

Expeto
04-19-2010, 04:03 AM
vpnetmon is not the greatest example of stable program. Tts a god forgotten software which haven't been touched by December 05, 2007. So don't expect a lot from it.

but usually the problems with it cause by, antivirus&firewall software, its understandable, that a security software to not allow another software to terminate uTorrent when it wants, and open it again.

also re-installing might do the trick

Bisibonzi
04-19-2010, 02:54 PM
Thanks, But I get Error with vpnetmon

bangtango
04-19-2010, 06:03 PM
Here are 6 free vpn services for those on a tight budget.

UltraVPN
JAP Vpn
PacketiX.net VPN
Hotspot Shield Vpn
Loke VPN Client
Alonweb free VPN software

Expeto
04-20-2010, 03:57 PM
Here are 6 free vpn services for those on a tight budget.

UltraVPN
JAP Vpn
PacketiX.net VPN
Hotspot Shield Vpn
Loke VPN Client
Alonweb free VPN software


they might be free but some of them inject lots of ads in your pages, this injections usually destroys your downloads, no problem for utorrent, hashcheck will fail and package will be destroyed, but it really kills rapidshare and hotfile downloads. Also many of them doesn't allow p2p on them.

anon
04-20-2010, 04:41 PM
HSS indeed injects ads in Web pages, but it doesn't ruin P2P or RS downloads (if you actually get a free slot on the latter, that is - a lot more people are using the service ;)).

UltraVPN is a relatively new one. It was very fast last time I tried it. PacketiX peaked 50kB/s in BitTorrent downloads, and I haven't used the rest.

haseeb221093
07-28-2010, 09:23 AM
hey! nice tut.....

jayreal
07-31-2010, 05:40 AM
Thanks for the info

Expeto
01-15-2011, 02:22 PM
revision bump

johhny
01-18-2011, 01:38 PM
very usefulll tutorial :d

infwb970
05-27-2011, 03:25 AM
Never heard about VPN. thanks for new info

uswah
05-27-2011, 11:06 AM
thanks for sharing such an informative post

spot101
07-11-2011, 08:21 AM
I always thought that VPN was basically the same as a proxy ... shows how much I know :huh:

Thanks for the info

anon
07-11-2011, 05:35 PM
I always thought that VPN was basically the same as a proxy ...

There's a subtle difference. A proxy will fetch resources for you - a VPN turns the Internet into a giant Ethernet cable connecting you to a private network :P

sapa50
07-13-2011, 01:31 PM
thank u i needed that one

cola
07-17-2011, 02:47 AM
Some of you might received threat letters[more info on threat letters (http://beingthreatened.yolasite.com/)] from copyright gangs. They basically collect the IP addresses make a list from them and they prepare a letter. Than they make a request to your ISP(the company you pay for the Internet connection) with this list and Internet Service Provider redirects this letters to everyone in this list. Usually this gangs don't even know your real mail address when they send a threat, so its usually safe to ignore their threats. If they had enough hard proof they would already made a real lawsuit. You are "Innocent Unless Proven Guilty". They are more like spammers, trying scam you.There are actually companies build to cash in the pirate

But there are people who knows your IP address and what you downloaded, with a court order they can find your home address and real name. Who knows maybe one of the new laws will allow this people to build a real lawsuit.

You might also don't like that other people can see what you are downloading (like downloading sick porns or worse (http://thepiratebay.org/torrent/5637784/Justin_Bieber_ft.Usher_-_Somebody_To_Love_%28Remix.2010%29__JB59))

Also there are also some ISP's are blocking, throttling BT users connection(slowing your speeds).

VPN solves all of these problems


What stops anti-piracy groups from getting a court order for the VPN to give up your billing info and real IP?

ca_aok
07-17-2011, 10:37 AM
Generally you get one that's out of their jurisdiction and/or in a piracy friendly company.

pokekevin
08-11-2011, 10:05 PM
Generally you get one that's out of their jurisdiction and/or in a piracy friendly company.


Would you have any recommendations for good oversea VPNs?

MixLogy
09-02-2011, 03:12 AM
Thank You

asbj
09-13-2011, 06:14 AM
Thanks. learn something.

abitoffile
09-25-2011, 12:17 AM
Thanks.

beezy192
09-25-2011, 08:38 AM
Thanks for this. :D

razorpro
09-25-2011, 03:14 PM
thanks for the guide! was useful

islandtime
02-18-2012, 12:47 AM
Thanks this is very helpful

xtonart
02-18-2012, 01:46 PM
..

notorious911
03-17-2012, 07:18 AM
thanks alot for the info

mustafabakar
07-02-2013, 05:38 PM
great tutorial, great thanks

gorilla09
07-30-2013, 09:39 PM
really appreciate all of the comments regarding my curiosities about VPN's...

mjp47
01-23-2014, 12:52 PM
good one th you

DiRTDOG187
01-30-2014, 12:10 PM
Awesome information thanks for the tutorial!

KLQx
03-20-2014, 02:34 AM
A tip for VPN users: If after you start using a VPN, your emails don't send (SMTP server not working), contact your VPN and have them whitelist your mail server. Took me a little too long to figure that out :)

zwarlockz
04-25-2014, 06:43 PM
This is a good basic tutorial, however at this point it is a bit outdated. Here are a few pointers to consider:

1) VPN's are a great place to start. I recommend a good non-logging VPN like Private Internet Access or Proxy.sh. These two vpn's also have built in VPN kill-switch technology, which will kill your internet connection if the VPN disconnects (user option) You can find a good comparison of these two VPN's here. (http://www.best-bittorrent-vpn.com/proxysh-vs-private-internet-access.html)

2) For many users, an anonymous Proxy service may be a better choice than a VPN because:

a) A proxy will offer faster speeds compared to a VPN running on the same server because of more lightweight (but still safe) encryption

b) A proxy service lets you route your torrent traffic separately from your regular internet traffic. Only the torrent client software runs through the proxy (if you choose), so your IP will show up as normal for regular sites you visit

c) with a proxy service you don't have to worry about disconnects. Because uTorrent, vuze, etc is running through your proxy service, this is the only way it is capable of connecting to the internet. If the proxy server drops the connection, the BitTorrent client software will instantly disconnect as well. It is not capable of connecting through your normal ISP connection without the proxy.

If using a VPN, however, uTorrent would just reconnect through your normal connection if the VPN drops, thus exposing your true IP to the swarm.

3) There are ways to deal with dropped VPN connections as mentioned in the tutorial. Several VPN's offer kill-switch technology. You can also use the VPN netmon software to autoclose specified software if it detects a change in your ip address. That software is a bit outdated, however, and I would recommend VPN Watcher (http://www.ugdsoft.com/products/vpnwatcher) instead.

4) peer block lists are worthless. They create a false sense of security. Don't even bother.

Other Resources:


Anonymous Bittorrent in 3 Steps (http://www.best-bittorrent-vpn.com/totally-anonymous-bittorrent-in-3-easy-steps.html) (The bittorrent VPN Guide)
How to Torrent Anonymously (http://www.vpntopten.com/bittorrent/how-to-torrent-anonymously-with-a-vpn) (VPN Top Ten)
VPN Providers that take privacy seriously (http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/) (TorrentFreak)

chakara
07-01-2014, 05:54 PM
I just was forwarded a DMCA Notice of Copyright Infringement by my VPN provider, GoldenFrog (aka VyprVPN).

No need to say that I'm leaving them right now.

PIA seems like a good option.

snake_man83
08-16-2014, 02:04 PM
Nice guide. Cheers.

Sepp_1982
09-03-2014, 10:43 PM
Thanks for this tuto ^^ I am using Ivacy (1 buck per year) with the firefox addon, SoftEther VPN and my usenet provider has a free one too ^^

nearuin
02-01-2015, 05:41 AM
Thanks for the guide

drtxb
12-26-2015, 11:02 PM
I have usenetserver. Has anyone used there USENETSERVER VPN? They added it recently and was wondering if anyone knew how good it was?

huhwat
01-02-2016, 11:05 AM
thanks for the info.

maximus_lt
11-26-2016, 11:31 AM
Update the pictures. Thank you.

lance554331
11-27-2016, 02:17 AM
thanks

mariad
08-09-2017, 12:31 PM
Thanks for the useful information.

shivanem
08-28-2017, 08:52 AM
Very nice guide.

Thanx for sharing this :)

blubber1875
08-28-2017, 08:36 PM
Thank you, this is vital for online life.

100percent
02-25-2020, 01:59 AM
Great stuff, but can it be updated?