![]() ![]() How can you circumvent such outcomes? By anonymizing and/or encrypting your BitTorrent traffic. If that person spying in your torrent activity is a hostile government, your ISP seeking to throttle your connection, or an agent hired by a media conglomerate to monitor BitTorrent networks, you can find yourself in unexpected trouble. This means anyone can join the torrent swarm and see what files you are downloading and, in turn, uploading-reciprocating to the swarm is part of the BitTorrent model. Your download is no longer between you and a single source but between everyone in the swarm and you. Everyone who is part of the swarm of file sharers using the same tracker and sharing the torrent you’re downloading can potentially send you a piece of that file. ![]() When you use BitTorrent, a distributed file sharing protocol, you don’t download a file from a single source but instead from any number of sources. When you visit a software repository online, for example, and download a new version of some application you’re engaging in an undistributed file transfer-the file went from their server directly to you.ĭistributed file sharing changes that model. ![]() Undistributed file sharing is when you connect to a single source and download a file. BitTorrent is a form of distributed file sharing.
0 Comments
Leave a Reply. |