p2p help

What do you guys do, if anything, to protect your IP address, while using p2p???

I recently had to download a bittorrent, and in the future I would like to do it as anonymously as possible.

Thanks

peerblock

---------- Post added at 10:51 PM ---------- Previous post was at 10:51 PM ----------

and I run comodo firewall just so I can control whats entering/ exiting my system

peerblock/peerguardian doesn’t work

then what else ya suggest. I use it and am quite pleased with the results

Here is a quote from over at Demonoid. It’s a couple years old but still relevant. I don’t use anything and am pleased with the results.

PG2 is a placebo. Of course, you see some addresses blocked. The fucking thing blocks ONE-THIRD of the Internet address space, by its own claim.

What you do NOT know is whether the addresses this piece of shit blocked were, in fact, the very peers who had the pieces you were downloading.

By inducing and then reinforcing paranoia, PG2 does more harm to torrenting than the RIAA, the MPAA and the FBI combined. I’ve said it before - if PG2 didn’t exist, the MPAA would have invented it. Smiley

Here’s just a small selection of the problems with this overhyped garbage:

http://www.slyck.com/forums/viewtopic.php?t=38295

The Media Defender internal email leak offered plenty of information for the taking. MediaDefender-Defenders said that they hoped that the email leak will prove to be a viable tool to protect against anti-P2P efforts. This is something BlueTack has been trying to do. After the email leak, a text file that compiles the complete IP (Internet Protocol) list Media Defender used while dropping fake files onto various P2P sites and networks was posted. While judging the effectiveness of these lists had proven to be an impossible task before the major leak, the effectiveness can now be tested.

Slyck began the investigation when BlueTack’s ‘Paranoid’ IP filter blocked one of TVUnderground’s new eDonkey2000 servers. A request for comment or information on the matter to BlueTack’s team went unanswered. To this day, why BlueTack has blocked only one of TVUnderground’s servers is unknown. In the meantime, Slyck is currently in the possession of a copy of BlueTack’s IP filter lists, and further investigation into related matters appeared warranted.

According to the BlueTack website, “B.I.S.S. is a site dedicated to improving the safety and awareness of all our members and guests, providing News, Security articles, Software Reviews, Technical Support, Guides, IP Research and Free Software needed to help us keep our connections to the net and each other safe, secure, and free from unwelcome intruders.”

Among the things offered are the blocklists, which have been met with either acceptance by the file-sharing community or complete rejection. Some say that the blocklists allow users to simply block any anti-filesharing company and allow users to connect with non-industry IPs. Others say that there is no way to get the right IPs before the IPs are changed to different addresses, thereby rendering the filters ineffective. It’s been the subject of debate for quite some time amongst many experts with no real way to test the lists, at least until the Media Defender email leak.

The ‘Paranoid’ eMule IP filter was retrieved on September 27, 2007. The Level1 IP blacklist, which is supposed to block all known anti-p2p IPs, was retrieved on September 30, 2007. The idea behind getting these lists now is to offer ample time for Media Defender’s now public IPs to be added to the lists for a much more effective blocklist for PeerGuardian users.

Slyck then obtained a copy of the publicly available 14.3MB compressed text file which lists all of the Media Defender’s IP addresses. At this point, it became obvious that testing such a large volume of IPs would prove to be an overly time-consuming challenge, at least by hand. In order to alleviate this problem, it was best to test one particular IP range. Conveniently enough, the first range started with 116. Slyck then decided to test all of the IPs that started with the number 116.

The total number of IPs used by Media Defender starting with 116 was 1,474. Obviously, BlueTack did block all IPs that started with 116, but how many Media Defender IPs were successfully blocked? When Slyck investigated, there was a common theme that blocklists seemingly jumped over several ranges used by Media Defender. After some extensive study using the Level1 list for anti-p2p companies and the ‘Paranoid’ list, BlueTack would have successfully blocked 16 IPs. Thus, this sample test offered 1.09% protection against Media Defender in that range.

The IPs that were successfully blocked were: 116.255.1.109, 116.255.1.154, 116.255.1.244, 116.255.1.27, 116.255.1.52, 116.255.1.85, 116.215.157.243, 116.212.14.223, 116.199.202.170, 116.199.202.240, 116.199.207.83, 116.199.207.84, 116.199.226.78 , 116.199.227.11, 116.199.227.27, 116.199.227.67. The remaining 1,458 IPs would still be allowed through even with these two filters being used today.

While BlueTack may still perpetuate the idea that their filters are 99% effective, these latest findings will only fuel criticisms towards BlueTack’s actual effectiveness. A complete test might not be possible short of creating a simple program to test every single number or spending weeks hand-testing every single Media Defender IP address. In the mean ime, it seems very apparent that BlueTack’s filters have a few holes.

And that was tested against known and published addresses!! In order to catch those 16 addresses (probably by dumb luck and the law of large numbers), BlueTack also blocked more than 4 million INNOCENT addresses in the same range.

==============================================================
A SECOND TEST:

I am convinced that it is not authentic. I did a reverse lookup on 500 or so somewhat randomly picked addresses from the 5.3 million addresses in that list. Look at the results – it’s pretty clear that the vast majority of the items in the list are residential dynamic IP addresses from all over the world.

===============================================================

Not Much Anonymity for Unprotected File-Sharers: Researchers Examine P2P Networks

Not Much Anonymity for Unprotected File-Sharers: Researchers Examine P2P Networks
The same technology that allows easy sharing of music, movies and other content across a network also allows government and media companies easy access to who is illegally downloading that content.

“Note that it is not our intention here to examine how accurate and comprehensive these lists are, though this would be interesting and challenging future work.”

=============
“after a quick look through the document, found elsewhere (PDF) (thanks again guys), all their stats are based on a couple of assumptions: that the blocklist contains no false positives, and more importantly, that it fails to contain no address that should be included. i will leave it to others to comment on the likelyhood of these assumptions being correct.”

FROM PG;s ow website:

Well, it is accurate in the sense that it blocks everything on your blocklist. <No shit, really?>
It is impossible to know all the addresses to block

PeerGuardian is known to be incompatible with McAfee and BlackICE firewalls. Outpost is also known to cause a problem if you shut down PG2 while it is running. There is currently no way around this, so we recommend you try switching to another firewall

PeerGuardian blocked someone, should I be worried?
Well, it was blocked, so why would you worry?

PeerGuardian is slowing down my connection!
This occurs because of the way PeerGuardian blocks packets, not connections.

PeerGuardian is blocking an IP like crazy, should I worry?
PeerGuardian will constantly block IPs. Many times you will see IPs get blocked three or more times before giving up - this is due to the way most computers handle reliable connecting. After a period of time, people may retry to see if you are responding yet. This does not mean people are spying on you. <No … it means they are trying to download or upload files in a swarm where you are connected …duh …>

A block list is a list of bad IP ranges that are know to spy on people’s computers.
<That’s simply a lie. A blocklist is =just a list of IP addresses. Its accuracy and completeness depend ENTIRELY on who created it and who contributed to it.>

This software is provided ‘as-is’, without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. <Translation - it’s a POS, we know it’s a POS and you’re just as liable to get caught with it as without, and we ain’t responsible. But thanks for the donation anyway …>

Total of IP’s being blocked right now:

* 2,377,645,666

<Yep TWO FUCKING BILLION blocked connections all to TRY to prevent one percent of the known addresses of MD from getting through.>

first things first, if the government was and/or are spying on you right now, it will be on a IP range that is not on our blocklists and is a secret range of IPs, second thing is, if the government was and/or are spying on you right now, they would be doing it on a whole diffrent level.

<Then why are you blocking the Department of Agriculture’s IP range? Are you afraid they’ll detect someone pirating a seed catalogue?>

Same attitude my friend Glen had. He just got his letter from Verizon saying if he continues to download copyrighted shows they will be turning over his logs and canceling his service. :slight_smile: And it was an episode of Bill Maher that he downloaded on a torrent, which made it extra funny to me that he got busted.

I never had issues even before I worked for TWC

If they were actually ready to cancel you it might be worth it to try the open wireless defence :lol:

Well my method includes some extra caution. Downloading the latest movie that just hit theaters or the last episode of a TV show, is a sure fire way getting a letter from your ISP. Unless you’re using a secure VPN, I really don’t see a effective solution to pirating incognito. Most letters you’ll receive are the “Please stop sharing this” blah blah blah.

Usenet via SSL ?

Could be a viable way. Never tried it, but seems like it’d work.

All peerguardian and peerblock do is block a bunch of random IP address. Looks like it works but really does nothing.

Usenet SSL here. 200GB downloaded so far this month. 2.37 TB since the last time I reinstalled sabnzbd and my counts got reset. Mostly HD movies a few weeks before their blu-ray release and TV shows hours after air date. Not a word from Verizon.

Thanks for the replies. I like the idea of using newsgroups instead. Newb at that though guess I’ll start reading up on it as well.

I have a box seeding fairly heavily 24/7 for nearly 3 years now. Several TB pushed through it, more of it up than down, no issues at all with TW. I don’t do anything special.

same here, not a peep from verizon, and i dl a ton.