Do you share?
Brickfrog @ brickfrog @lemmy.dbzer0.com Posts 0Comments 309Joined 2 yr. ago
FYI for those using public torrents Nemesis43 / Nem43 still uploads those comic packs/dumps to 1337x and Demonoid. Those torrents often get mirrored to TorrentGalaxy too.
From OP's link under the "operate a Snowflake proxy" section
You can join thousands of volunteers from around the world who have a Snowflake proxy installed and running. There is no need to worry about which websites people are accessing through your Snowflake proxy. Their visible browsing IP address will match their Tor exit node, not yours.
A Snowflake proxy is not a Tor exit node.
Store them offline. A simple USB stick with screenshots of your QR codes & backup codes would cover this.
Some people also print them out to keep offline but you'd need a printer handy to do that.
TBH I've never understood why someone would store backup/recovery codes in the same application they store their passwords in. If your password storage is compromised then you'd indeed be completely and utterly compromised when the attacker also has your backup/recovery codes.
Obvious answer is that people are sharing otherwise you'd have nothing to download :P
For me I usually permaseed, or at least seed back 5-10x if not planning to keep a download. Also have created new uploads at torrent sites and occasionally fill requests.
Usually that isn't a limiting factor so it's not something you have to worry about. You can technically leave everything unlimited except for Global Connections and Upload/Download bandwidth, those are really where you'd want to set limits if necessary. Your torrent client is capable of auto managing everything else.
Not only that, these presumably would all be old posts/comments being re-posted with current date/time. Maybe best to make sure the specific community or instance you're sending this to accepts old Reddit content.
Interestingly this could be a use-case for Lemmy users having their own self named communities where they can dump old post/comment data into if they wish. e.g. for you it would be https://sopuli.xyz/c/MentalEdge (if it had existed).
For now you're already posting on the best Lemmy instance for that sort of discussion (https://lemmy.dbzer0.com).
Search around, there's been a bunch of discussion re: FMHY and their instance being down e.g. https://lemmy.dbzer0.com/post/1091528
Their website is still up (https://fmhy.net/) & they're working on bringing their instance back up. I think the tricky part is whether they can still keep their old posts/comments/user accounts and re-federate with a new domain, I'm not so sure if that's actually possible. Personally I think the old .ml instance is new enough that if they need to re-start from scratch on a new domain then may as well go for it.
Also see the comments in the other post, they do seem to have announcements about this at https://very.bignutty.xyz/@FMHY
Perhaps, I've never really kept track of that content on usenet. But without usenet/torrent support that does make this *arr app kind of incompatible with the rest of the *arr ecosystem, just seems like an odd design choice.
I don't look for that type of content too much but usually I'd just download packs from public torrent indexers e.g. Nemesis43 / Nem43 still uploads to 1337x and Demonoid. Those torrents often get mirrored to TorrentGalaxy too.
It's an *arr app without usenet/torrent support? Seems like an odd choice.
But at least it looks like they haven't ruled it out in their github as a feature request.
Like the other commenter said you should only forward 1 port. Open a port forward for the port number specified in your torrent client's settings for Incoming Connections.
Also keep in mind some ISPs may not allow you to forward lower port numbers, you should aim for any port in the Ephemeral port range (49152-65535) see https://en.wikipedia.org/wiki/Ephemeral_port
When you configure your router make sure you are forwarding both TCP and UDP. And when you're doing it create a regular port forward, not something like port triggering which is something else.
Test your port forward with any port test website to confirm it is working e.g. with the torrent client running browse to https://www.canyouseeme.org/ or similar & make sure the test is successful using the port number you forwarded.
If none of the above works then you have something else blocking the port e.g. firewall or anti-virus/malware. Or there's missing information you forgot to share e.g. maybe you're using a proxy or VPN, maybe you're using a ISP using carrier grade NAT (CGNAT) that cannot do port forwarding (https://en.wikipedia.org/wiki/Carrier-grade_NAT), maybe something else.
EDIT: One other idea, enable your log in qBittorrent (click View / Log and make sure to enable all the checkboxes) this should add a "Execution Log" tab in your main qBittorrent window. Now quit qBittorrent, wait until the qBittorrent process is shut down, then start qBittorrent and review the log as it starts up. Maybe you'll see new information in there you haven't noticed before.
I have a peer with static IP address, is there any tools to extract what he/she was downloading?
Not directly, that's not how the bittorrent protocol works.
That website you reference doesn't work the way you are thinking it would work, it does not examine an IP address & then somehow figure out what it is downloading (this is impossible). That website does exactly what every other copyright troll service would do, they monitor specified torrents, load them in their own torrent software, save all the current peer IP addresses associated with that torrent, then they claim you were downloading that.
So with just an IP address no you could not do anything like that. You'd need to scour the internet for as many torrents as possible, load all the current peer IPs into a massive database, then you can search the IP address in your database & see what comes up. In other words you need to know the torrent(s) before you know the peer IP addresses.
You are firewalled (not port forwarded / not connectable).
Like the other commenter said you need to port forward your torrent client's incoming connection port. You may need to log into your network router to do that.
Also make sure your OS firewall is allowing your torrent client access to the internet.
And also make sure to whitelist your torrent client in any anti-virus/malware software, sometimes those block torrent clients too.
Note this is currently optional according to the admin. Torrent links/hashes are fine to post here. See earlier discussion that
does the VPN having this feature enable to do it even if my ISP doesnt allow port forwarding?
Yes, VPN itself is an encrypted connection to the VPN server. As long as the VPN service has port forwarding available on their VPN server then you will have that feature available when you connect to them. But it has to be done through the VPN connection e.g. nothing to do with your ISP.
Also see the earlier posts in !piracy@lemmy.dbzer0.com e.g.
https://lemmy.dbzer0.com/post/465513
https://lemmy.dbzer0.com/post/312389
went to log back into it today only to find my account has been deactivated.
Correct, they regularly deactivate accounts that haven't been logged into after x days. I don't remember the exact number of days but it should be in their rules.
I went onto the IRC and was told that inactive accounts can’t be recovered
Yes that's the IPT racket, they expect you to pay them to re-join. Note that even though they won't re-activate your old account they didn't say you can't re-join. One of the many reasons that tracker isn't considered reputable.
PS - Your post is breaking rules here, just FYI.
See the earlier post
https://lemmy.dbzer0.com/post/694841 (in !piracy@lemmy.dbzer0.com)
Idk if it’ll let you edit them without deleting them.
Yup it does, that's how I used it. Did a cycle to edit with random words, afterwards checked if it worked & if it looked okay went ahead with a delete.
The edit feature is to create a new entry on the database in case reddit isn’t actually deleting comments from their database when they show as deleted. Although if they’re doing that then they probably keep a change log of the comments as well.
You know I thought that too. But I've seen some people talk about their GDPR data requests & they received the last edited version of their posts/comments, not the original. The data request doesn't even contain anything like a change log of every post/comment. But I guess you could argue the data request is fulfilled with just the last version regardless of how many versions of the same post/comment actually exists.
No change in status AFAIK. See the earlier posts
https://lemmy.dbzer0.com/post/527556 (in !trackers@lemmy.dbzer0.com)
https://lemmy.dbzer0.com/post/782670 (in !trackers@lemmy.dbzer0.com)
https://lemmy.dbzer0.com/post/528174
It's definitely not. Copyright trolls send letters to all peers in a torrent swarm regardless of uploading/downloading. And in any case the bittorrent protocol uploads and downloads simultaneously - Even if the commenter is attempting to seed 0% they are still participating in the torrent swarm and uploading pieces of data to others in the swarm during their own download.
I have to assume that commenter's VPN is working as intended or maybe they have been lucky.