Skip to main content

uTorrent 3.3 Adds Counter Measures Against Monitoring of Downloads

utorrent-logoBitTorrent networks are favorite fishing spots for anti-piracy outfits such as RIAA and other research organizations specialized in collecting intelligence on downloaders. BitTorrent is inherently insecure and anyone who engages in file sharing leave a trail of information behind that can uniquely identify a peer and the files they have downloaded. There have been hundreds of cases in the past where file downloaders were sued for copyright infringement on the basis of IP address alone.

Many people are probably aware that they leave their IP address open when they download files from BitTorrent, but believe they are reasonably safe because they know that their IP address is dynamic and that casual monitoring of IP-traffic is not enough to identify them. However, there is a second variable that can be used to monitor a user’s downloads and that is the peer-ID. Your Torrent client generates a unique peer-ID for you and then send that out every time you connect to the BitTorrent network. Tracking companies can monitor the peer-ID and use the information to build a rather accurate database of downloads that come from the same client, regardless of the IP-address. While this information might be of use to private BitTorrent trackers, on public ones it poses a clear privacy threat.

The peer-id has always been constant on uTorrent for connections with trackers and peers, until version 3.3. The new version, which is still in alpha, randomizes peer ids after a specific time period to mitigate tracking of users when they use non-private torrents. The new feature leaves tracking companies with random chucks of data from different IP addresses with no unique peer-IDs to associate each chuck to a particular user.

BitTorrent Inc. told TorrentFreak that the new feature only applies to public torrents, and is a change to the core code, so users don’t have to enable it.

However, users should be aware that IP-addresses are still public and trackable and can still point to you, but only if your ISP is coerced into revealing the information.

Interested users can download uTorrent 3.3 Alpha from this page.

Comments

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: