


There is no knowing how many nodes there are between a certain node and you, so this is just so plain stupid I don't think anyone is trying to abuse the Tor protocol right now.ġ) Use PeerGuardian, update everyday, makes you feel good at leastĤ) Set up a browser to use Tor and use that browser whenever you do p2p activity (register and use private trackers, download torrent files from any tracker, post in forums, chat in IRC, using Google/Gmail etc.)ĥ) Set you firewall to block incoming ping requests and outgoing ping replies, and as much else as you can to still have a connection (NetBIOS, other ICMP protocols, IGMP etc.). So to find YOU, the traffic must first be decrypted, then one would have to follow each last node in the chain, get control of it, decrypt it, and so on. So in µtorrent go to Other options and setup Tor as "Proxy Server for HTTP requests." No Tor node should know it's place in the encrypted chain, and the traffic is encrypted. I'm looking for input/experience/advice on any of these methods (and ones I didnt mention).Įncryption & Traffic shaping articles worth noting. While it is more effective from an anonymity view, it seems it might really slow down your transfers. It's not supposed to effect your speeds but I have yet to personally try it. It's said that current versions of PeerGuardian dont use hardly any CPU resources and could help a little. What is currently the best method to protect one's self? PeerGuardian? ToR? I realize that no option is 100% secure but rather offer varying levels of security. Still, I sometimes wonder if I should be doing more to protect my privacy/security when downloading the not so legal warez thats floating around. Fortunately my ISP does not cap/shape my torrent connections.
