this post was submitted on 10 Mar 2025
41 points (100.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

58590 readers
522 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):

🏴‍☠️ Other communities

Torrenting:

Gaming:


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
 

Sadly there's no recording of this talk.

you are viewing a single comment's thread
view the rest of the comments
[–] Chewy7324@discuss.tchncs.de 3 points 20 hours ago

Depending on the tracker once you notice a stolen API key it might already be too late. E.g. if they tank your ratio or break the rules in another way.

I could see the real source IPs for all other users in last logs.

Also, they mention in the slides that some seedbox providers allow users to find the IPs of other users connecting to the seedbox. Using a VPN for ssh might be advisable to protect your privacy from other users.

Otherwise your right as it won't impact your network at home.