Another viable option: Usenet access. Currently, you will only find pay-for-play access, but you will have access to many thousands, if not millions, of files of every kind.
If this sounds interesting, try a service like
http://www.easynews.com/ and use their free 14-day trial. This way you won't need a proxy, VPN, or anything else -- you can use a standard HTTP (non-peer-to-peer) or HTTPS (secure) download. I've used this company for over 8 years -- they're great.
-Aaron-
Usenet... hmm. I haven't heard that mentioned in some time. I'm by no means knowledgeable about the underpinnings of Usenet, but couldn't you just get your own free client and connect to the NNTP servers? I know on the internet Usenet is transported via NNTP on TCP Port 119 for standard, unprotected connections and on TCP port 563 for SSL encrypted connections; do you just make a standard server-like connection to these newsgroups? How does it work out? I'm especially interested in the SSL connection applications, as net neutrality is fading fast. Could you elaborate more on how the underpinnings work?
I'd rather not pay for a monthly fee if I can get a freeware client and connect to the server, par and rar myself from the binaries, and do all that jazz on my own. Is the monthly fee for private server access? Is SSL free? I mean, I really don't need a web browser here either, like the site you posted. It sounds like easynews downloads from the NNTP servers themselves, pars and rars, and then posts for HTTP/HTTPS download on their site, a service I really don't need. While I understand that there's paid newsgroups with large libraries available for a monthly access fee, is there any free, open servers with large libraries? Any public endeavors there, dare I say into piracy? I mean my issue is this; if I'm going to be re-downloading material I own, or pirate material, why should I pay them for something I either own, or something that they don't legally own? Is there anything public like demonoid or TPB? I also hear that certain ISPs host NNTP servers, is this true?
Sorry for the massive wall of questions; I'm just curious
. I haven't really heard much about usenet in years; the last I heard of it was like 1996 for real newgroups with actual news, not binaries.
In any event, I was using Transmission for my torrents and I did the following:
I went to a free proxy site such as proxy(4)free, xroxy, etc and found a proxy that was listed as "anonymous." Then I went into Transmission > Preferences > Network and checked the box that reads, "Connect to Trackers With a Proxy." I then entered in the numerical address in the Server field, selected my corresponding port and protocol.
Now, keep in mind that I may be totally off base here and given myself a false sense of security in the process. I actually stumbled across this thread as I was trying to see if I could do the same thing in Vuze as the fields are more complex than those in Transmission (with regard to IP address) and I wanted to ensure I was doing the right thing. If one of you experts out there wouldn't mind throwing in your two cents, I would appreciate it and perhaps it will help out someone else here at the same time.
In short, yes, you can do the exact same thing in Vuze that you with Transmission. I personally have never set up a proxy in Vuze, or transmission, so I can't speak to the specifics, but I imagine its rather option-plenty and not that straightforward. My advice is to enter the fields to the best of your knowledge, and then test your torrent IP address. You can do this by either looking at the torrent details and checking your IP, or by using a site like
this. Obviously, you want the IP seen on the torrent to be different from your IP; namely the one you see in an un-proxied web browser
here. Seeing a difference in torrent vs regular IP however does not ensure security; that just tells you that the proxy is working (to some degree). This is the first step.
Now we have to get into the specifics, in order to ensure that you're safe. For starters, you want to enable the proxy for both trackers and peers; this really depends on the program and the setup, some will default to this behavior, others handle traffic differently so this option has to be used. The next thing to consider is the type of proxy you're using.
More specifically, is it SOCKS, or HTTP? An HTTP proxy will NOT work; you will not have any protection here. If its SOCKS, is it SOCKS4, or SOCKS5? This is a major difference, and you HAVE to know which it is. The reason is this; when you connect to a peer to download, you typically connect via TCP, and download via TCP. You connect to the tracker typically via UDP, but not always, as you can also receive the tracker list (aka peers and seed list) via TCP; it depends on the tracker and the specific torrent specifications. Note I say typically a lot in the above two sentences; that's because its liable to change given the client, tracker, or torrent. For example, OpenTracker software supports UDP tracker functions, so typically most torrents on OpenTracker powered trackers connect to the tracker list via UDP (Just as an fyi, OpenTracker is the most popular tracker software package). TCP is still an option though. Normally one would connect to a peer and download via TCP, however since TCP is subject to traffic shaping, and since most ISPs don't do deep packet inspection, UDP has been gaining popularity for peer-peer connections and downloads. Most notably, uTorrent, the original makers of BitTorrent, who are considered cannon in regards to the advancement of the torrent protocol, have included UDP capabilities for peer-peer connections and downloads. I don't know if UDP connections for downloads come enabled by default, or if other clients use this function yet, but it's possible that Vuze or Transmission has adopted this new feature, and has enabled it by default. I would make sure to check it out; poke around in the preferences, and see if its there and/or if you can turn it on or off. Furthermore, there is one more use of UDP in the BitTorrent protocol; DHT. DHT is the distributed database; you can read more about that above in my other posts. Basically it is a distributed network for finding seeds and peer independent of a tracker, and can run in tandem with one. It is enabled by default in Vuze. DHT uses UDP to find and make connections with other seeds and peers in the distributed database; once a connection is made it uses TCP to download, like a regular torrent does. So... why did I just tell you all of this? Well, don't worry, I didn't waste your time, its just so you understand a little of how torrents work, and why the following is the unfortunate (or fortunate) truth required to maintain security.
Remember when I asked about the type of proxy server it was?
If the proxy is a SOCKS4 server, which is the most likely possibility, as SOCKS4 is the most popular and prevalent proxy, then you're in trouble. SOCKS4 only supports TCP, NOT UDP. It's a big uh-oh. If you have a SOCKS4 proxy, you have to do the following: 1) Disable DHT. This means all of your torrents HAVE to have a working tracker. 2) Force encryption. This should be done regardless of the type of proxy; you should be able to force encryption out. 2) Disable UDP trackers. This preference will be hard to find, but it should be somewhere, especially in Vuze. Note that there's major drawbacks to this. For one, you won't be able to connect to UDP trackers anymore, which is a large segment of the torrent scene. If the tracker allows TCP connections you'll be fine, but any torrent with a UDP only tracker just became a no-go. Furthermore, if you choose not to disable UDP, then the UDP packets will bypass the proxy, and go on their merry way irregardless of security. These packets will then tell the tracker your real IP address, which will be listed on the tracker list, and peers and seeds will connect to you at your original IP, not the proxies IP. Thus, the proxy is worthless, as only your TCP traffic out will be from a differrnt IP. In otherwords, disable UDP, or don't use a SOCKS4 proxy.
Before I delve into SOCKS5, something should be noted; some proxies may not allow network functions in. In other words, many proxies may not allow TCP/UDP connections inward from the proxy to the computer, it depends on how it was set up and what ports are blocked in what direction. Some will however, it really just depends; this is something else that you need to know about your proxy of choice. If the proxy is listed as torrent-safe, you should be fine. This is another reason why VPNs are preferable; data and network functions easily go both ways.
Onto SOCKS5! Hey, good news! If you have a SOCKS5 proxy (more rare), you're in the green! SOCKS5 supports both UDP and TCP protocols, so as long as you have the network access both ways (as in the above), you're good to go! Once again though, force encryption out for better safety and privacy.
Now for some disclaimers and general warnings. First, programs don't always function as advertised. Just because you put in the proxy address doesn't meant that its going to force all of the programs network connections through the proxy; in fact some programs are notoriously bad at this. I don't know how Vuze rates on proxies, but I know for the TOR plug-in/protocol it fails pretty hard; Vuze will go outside of the TOR network frequently, and on its own. Therefore a couple of safety measures should be taken, just to be sure. 1) Disable DHT. It's really not safe to start with. 2) Force encryption out. 3) Multiple proxy instances for multi use; in other words, if you're using the proxy for two different functions, assign different port numbers for the two programs. If they share the same port and are using the proxy at the same time, the bit torrent client is liable to leak data unabated via your normal IP. Finally, 4) If you're still really concerned about your safety and the program leaking TCP/UDP data and/or your IP address outside the proxy, there are programs to solve just that. I don't know of any off the top of my head, but I know for a fact there are some that will take all of the network data from an application and force it directly onto the proxy, even if the program leaks data to start with. Of course if you have a SOCKS4 proxy and you have UDP enabled in your BT client, this isn't liable or guaranteed to work, as it still could escape depending on the program used to contain it.
I know that's a lot, and is a giant wall of text, but I hope that helped you out.
To the OP: Regarding your private data, can I highly suggest True Crypt for you? Once again, I was in a similar boat, learned about TC and found it was one of the best free pieces of software I've come across on the net. The learning curve was small and essentially it allows you to create encrypted "containers" (folders at a Department of Defense level of secure encryption) where you can keep your files "locked" up. To open them, you simply launch the application which loads in a few seconds, type in your password and viola, your files are there again for you. You can also do the same thing with entire drives instead of containers. You can do it with external drives, flash drives, CD's, DVD's, etc. I had paid for FolderLock on my old PC, but TC is a thousand times better and the best part is that it is free.
While this is undoubtedly true, and possible, and it works, there also is another overlooked option, Disk Images. Use disk utility to create a read/write DMG that is password protected; you can have it 256bit encrypted, which is more than enough for any civilian. Hell, 128 is enough. Not modifying its contents anymore? Then you can compress it too. Need more room? Make another, drag your files over. Those programs work though too; I'm just cheap and I love DMGs