Re: Extra updates for PeerGuardian
Quote:
Originally Posted by
Sonnentier
Yeah, if you use a proxy, there shouldn't be a problem.
But if I only block spybots, then I still fear that by this way or the other, my IP might be leaked.
I don't know if a sole IP is already enough evidence... you could blacken someone.
Even with using a Socks or SSH proxy server the DHT Network will still be a problem if the DHT Network is enabled, so you want to disable it, other wise as far as I understand the traffic from and to the tracker will go through the proxy but the traffic from and to the DHT Network will not go through the proxy but the DHT Network will make a direct connection, (which would leak someone's own IP Address to the DHT Network) even while using a proxy, so if you are using a proxy server then make sure to:
"Disable" the each of the following:
The DHT Network
Local Peer Discovery
E Peer Exchange
Limit Local Peer Bandwidth
And also always for Protocol Encryption select:
'Forced'
And do 'Not' check the box 'Allow Incoming Legacy Connections'
The Socks protocol does not include it's own encryption, so it is vital to have the Protocol Encryption set to the settings above
I even keep the Protocol Encryption Settings this way when using a proxy with SSH Protocol instead of a Socks proxy, and it does not create any problems with the SSH connection to leave the Protocol Encryption settings that way
All and all my favorite proxy protocol for a BT client is Socks5, SSH is sometimes alright for a BT client but the connection will sometimes drop, with SSH you have to use a second party app like Putty, although the SSH protocol is my favorite by far for anonymizing the web browser
I know that PPTP proxy server protocol and Open PPTP proxy server protocol anonymize all of the internet traffic of the computer but I don't really like PPTP and Open PPTP
I know that internet security is very important to get right, and that is why I mention certain things more then once, and if I am wrong with any of this then anyone should go ahead and reply with corrections and also suggestions
Re: Extra updates for PeerGuardian
Yes, DHT can't be proxified, it's the same for eMule and others.
Looks like wrapping those UDP packets through socks isn't that easy.
I don't use a proxy, maybe I could find one to do the scraping, but not for the whole transfer.
Getting an address from DHT or Peer Exchange is a weak evidence, I could insert fake addresses into DHT and nothing hinders me from transmitting random addresses to the spybot via PX. The timestamp is also inaccurate, I don't know how often they poll the swarm, but it always has some delay. So is this sufficient to file a claim?
I guess I can't get around PX, because no matter what I set, the other peers might always exchange my address with other clients.
Re: Extra updates for PeerGuardian
There are three absolutely crucial blocklists required (in regards to P2P safety). They are:
1. The P2P.php list within the PG 2 program (installed automatically).
2. The Bluetack P2P Level 1 list.
3. The Bluetack BOGON list.
NOTE that both P2P blocklists (1. and 2.) are very similar, and certainly contain redundancy in entries. The general consensus is that the Bluetack blocklists are superior to PG 2 (in terms of updates and content) thus we recommend using both concurrently. But besides these two blocklists, perhaps the most important blocklist of all is the Bluetack BOGON list:
BOGON IP addresses, or Bogon Space, are known as unassigned IP addresses and are not publicly used. Hence, anyone using them is very hard to trace and little information can be garnered about the users from these IP ranges. Since anti-piracy groups (and their cohorts) do not wish to be on any blocklist, current data suggest these are likely the most common ranges used nowadays by the more ‘aggressive’ pirate-seekers to gather evidence for lawsuits and prosecution. So it is imperative that these IP ranges are blocked, and that this list be incorporated into PG 2.
Re: Extra updates for PeerGuardian
SG TCP Optimizer
http://www.speedguide.net/downloads.php
If I remember right the default in Windows (at least for XP 32bit) for packets is 1500 and if you wanted to use PPTP or Open PPTP then it is good to set the MTU setting to 1400 or less otherwise the packets will be to big to run smoothly in the PPTP and Open PPTP protocols and they will choke the PPTP and Open PPTP network, I set it to 1000 when ever I use those two protocols, although it is seldom that I ever use those protocols, using SG TCP Optimizer to change the MTU settings will change it in the registry
PPTP and Open PPTP are not my favorite and I recommend using Socks5 or SSH instead
After you set the MTU settings with SG TCP Optimizer then you have to restart the computer for it to take effect
Re: Extra updates for PeerGuardian
wow thanks what a big difference in size from the last one i had in that folder. I had a file in there from midnight torrent that gives away there blocklist to everyone. The one from that site you gave me what 4 times as big.
Quote:
Originally Posted by
MackDaddy
Quote:
Originally Posted by
Frankthetank1
can i just add these to utorrent? PG doesnt work with vista 64
I don't have Vista 64 but I found this about the instructions to make Peerguardian for Vista 64 to get around the problem with Vista 64
If this doesn't fix the problem then reply back
Peerguardian 2 download for Windows Vista x64 Edition
http://coblitz.codeen.org:3125/phros...c1-test2-2.exe
Vista x64 users will need to perform the following steps
http://phrosty.phoenixlabs.org/pg2-rc1/#vista64
Re: Extra updates for PeerGuardian
Quote:
Originally Posted by
Frankthetank1
wow thanks what a big difference in size from the last one i had in that folder. I had a file in there from midnight torrent that gives away there blocklist to everyone. The one from that site you gave me what 4 times as big.
Quote:
Originally Posted by
MackDaddy
Thank you very much for the reply, these are the things that I work with a lot, stay anonymous
Peace
Re: Extra updates for PeerGuardian
Here are some more IP Blocklist updates for 19 Mar 2009
You want to have a extra folder that is not the installation directory folder for extra Peerguardian updates, if you already have a extra folder for peerguardian updates then make another folder within that folder for these 8 extra udates, then follow the instructions for 'PeerGuardian' 'list manager' ect that I mentioned earlier in this thread
http://blocklistpro.com/download-cen...ll-blocklists/
http://blocklistpro.com/download-center/ip-filters/
With these updates for March 19 2009, 6 of the updates are in txt format already and two are dat files, nipfilter.dat and pipfilter.dat
The dat files can be used as directly but if you want you can use the dat files with notepad, by opening notepad and select 'files of type' 'all files' then browse for the extracted nipfilter.dat and pipfilter.dat files
Once they are opened in notepad then 'select all' then copy and paste the contents to another notepad and save that other notepad, make sure to rename the new notepad to 'nipfilter' and 'pipfilter', you have to copy and paste the text from the notepad that opened the dat file to another notepad otherwise it will save it as a dat file instead of a txt file
Re: Extra updates for PeerGuardian
Here are two more Blocklist updates
for these two updates follow the instruction in the post above this one to change these to txt format and to use these with Peerguardian
http://blocklistpro.com/download-cen...cial-requests/
While using all of the Blocklist updates and also the regular Peerguardian updates, you should be now blocking around 3 billion different bad IP addresses
Here are all of the links again to the Blocklist updates mentioned in this thread
http://blocklistpro.com/download-cen...klists-mirror/
http://blocklistpro.com/download-cen...plist.zip.html
http://blocklistpro.com/download-cen...plist.zip.html
http://blocklistpro.com/download-cen...ll-blocklists/
http://blocklistpro.com/download-center/ip-filters/
http://blocklistpro.com/download-cen...cial-requests/