Which are the torrent sites not blocked by Airtel & Relaince?

6pack

Well-Known Member
ex-Mod
Sep 19, 2005
7,535
1,541
302
Wanted to see some movies not available here on Amazon Prime.
Zooqle is being blocked by Airtel - even https address.
 

6pack

Well-Known Member
ex-Mod
Sep 19, 2005
7,535
1,541
302
use Tor to browse torrent sites and get magnet links
Isn't tor a CIA program?

Use opera to browse, it has built in vpn
i stopped using opera since they started showing ads from indian companies when using their vpn and sold out to a chinese company.

btw, found a site : https dot yts dot it
low quality rips in 720/1080p. not much in library though. seems to be some ripping group website.
 
  • Like
Reactions: Futureized

Futureized

Well-Known Member
Adept
Feb 11, 2013
391
62
67
Mumbai
www.wikipedia.org
Isn't tor a CIA program?



i stopped using opera since they started showing ads from indian companies when using their vpn and sold out to a chinese company.

btw, found a site : https dot yts dot it
low quality rips in 720/1080p. not much in library though. seems to be some ripping group website.
Best catch m8.. But couldnt get more details about TOR THING..
Does CIA sells all those nukes via TOR ?
 

pauldmps

Well-Known Member
Veteran
Mar 20, 2011
1,407
229
101
27
Surprisingly, the original PirateBay site opens fine on ACT Fibernet (thepiratebay.org)
 

6pack

Well-Known Member
ex-Mod
Sep 19, 2005
7,535
1,541
302
Best catch m8.. But couldnt get more details about TOR THING..
Does CIA sells all those nukes via TOR ?
Look at the history of TOR


Bulk of it's funding came from USA govt while doing military research.

More about why Tor is not for torrenting:
Some protocols expose IP addresses
Researchers from the French Institute for Research in Computer Science and Automation (INRIA) showed that the Tor dissimulation technique in BitTorrent can be bypassed by attackers controlling a Tor exit node. The study was conducted by monitoring six exit nodes for a period of twenty-three days. Researches used three attack vectors:[115]

Inspection of BitTorrent control messages Tracker announces and extension protocol handshakes may optionally contain client IP address. Analysis of collected data revealed that 35% and 33% of messages, respectively, contained addresses of clients.[115]:3 Hijacking trackers' responses Due to lack of encryption or authentication in communication between tracker and peer, typical man-in-the-middle attacks allow attackers to determine peer IP addresses and even verify the distribution of content. Such attacks work when Tor is used only for tracker communication.[115]:4 Exploiting distributed hash tables (DHT) This attack exploits the fact that distributed hash table (DHT) connections through Tor are impossible, so an attacker is able to reveal a target's IP address by looking it up in the DHT even if the target uses Tor to connect to other peers.[115]:4–5
With this technique, researchers were able to identify other streams initiated by users, whose IP addresses were revealed.[115]