Which are the torrent sites not blocked by Airtel & Relaince?

6pack

ex-Mod
Wanted to see some movies not available here on Amazon Prime.
Zooqle is being blocked by Airtel - even https address.
 
use Tor to browse torrent sites and get magnet links

Isn't tor a CIA program?

Use opera to browse, it has built in vpn

i stopped using opera since they started showing ads from indian companies when using their vpn and sold out to a chinese company.

btw, found a site : https dot yts dot it
low quality rips in 720/1080p. not much in library though. seems to be some ripping group website.
 
Isn't tor a CIA program?



i stopped using opera since they started showing ads from indian companies when using their vpn and sold out to a chinese company.

btw, found a site : https dot yts dot it
low quality rips in 720/1080p. not much in library though. seems to be some ripping group website.
Best catch m8.. But couldnt get more details about TOR THING..
Does CIA sells all those nukes via TOR ?
 
Best catch m8.. But couldnt get more details about TOR THING..
Does CIA sells all those nukes via TOR ?

Look at the history of TOR


Bulk of it's funding came from USA govt while doing military research.

More about why Tor is not for torrenting:
Some protocols expose IP addresses
Researchers from the French Institute for Research in Computer Science and Automation (INRIA) showed that the Tor dissimulation technique in BitTorrent can be bypassed by attackers controlling a Tor exit node. The study was conducted by monitoring six exit nodes for a period of twenty-three days. Researches used three attack vectors:[115]

Inspection of BitTorrent control messages Tracker announces and extension protocol handshakes may optionally contain client IP address. Analysis of collected data revealed that 35% and 33% of messages, respectively, contained addresses of clients.[115]:3 Hijacking trackers' responses Due to lack of encryption or authentication in communication between tracker and peer, typical man-in-the-middle attacks allow attackers to determine peer IP addresses and even verify the distribution of content. Such attacks work when Tor is used only for tracker communication.[115]:4 Exploiting distributed hash tables (DHT) This attack exploits the fact that distributed hash table (DHT) connections through Tor are impossible, so an attacker is able to reveal a target's IP address by looking it up in the DHT even if the target uses Tor to connect to other peers.[115]:4–5
With this technique, researchers were able to identify other streams initiated by users, whose IP addresses were revealed.[115]
 
Back
Top