NHacker Next
login
▲Resurrecting a dead torrent tracker and finding 3M peerskianbradley.com
388 points by k-ian 9 hours ago | 115 comments
Loading comments...
diggan 8 hours ago [-]
> Is this legal?

Why wouldn't it be? You're not actually hosting a tracker in this case, only looking at incoming connections. And even if you do run a tracker, hard to make the case that the tracker itself is illega. Hosting something like opentrackr is like hosting a search engine, how they respond to legal takedown requests is where the crux is at, and whatever infra sits around the tracker, so police and courts can see/assume the intent. But trackers are pretty stupid coordination server software, would be crazy if they became illegal.

jekwoooooe 8 hours ago [-]
Is this legal isn’t a useful question. The better question is how likely are you to get sued? With civil lawsuits it doesn’t matter if it’s legal you can be sued and harassed by lawyers if you get on their radar.
legohead 8 hours ago [-]
No need to sue. Send a cease and desist and your average hacker like OP will take it down in a hurry...
daneel_w 4 hours ago [-]
In this case not even a cease-and-desist was needed. Just seeing 1.7M peers crying out in the void for company was enough. Living in a country overly friendly with Hollywood and its money, I do understand him.
bilekas 7 hours ago [-]
I’m not sure if that’s true actually, you might get a takedown notice, but to sue, and maybe I’m wrong but you have to claim damages, all op has to do is not announce out?

IE he can see the peer pool but they don’t announce the peer list.

jekwoooooe 17 minutes ago [-]
Suing isn’t just going to court it means subpoenas, depositions, motions, letters, etc. all this stuff costs a ton of money without you even stepping foot in a court. The system is so broken
dymk 6 hours ago [-]
The RIAA doesn't have to sue to make OP's life miserable. They have enough lawyers on the payroll to drown him in perfectly legal demand letters. Go one step further and assume the demand letters are harassment - what's OP going to do, sue the RIAA?
Retric 10 minutes ago [-]
Nahh, for a bunch of annoying letters take them to small claims court. Cheap for you, expensive for them, and you win if they don’t show up.
3 hours ago [-]
gpm 8 hours ago [-]
Because knowingly helping people commit crimes generally counts the same as committing the crime yourself. I.e. federally in the U.S. under 18 USC 2a https://www.law.cornell.edu/uscode/text/18/2 The software you're running being "simple" isn't a defence for doing illegal things with it - like aiding others commit crimes.

There are a few internet/copyright safe harbor provisions (in the US) that might maybe (probably not) make it not a crime, I don't know, I'm not a lawyer. But your general thought when you hear "helping someone else commit a crime" ought to be "that's probably a crime itself".

rockskon 8 hours ago [-]
Wouldn't particular knowledge be required? I'm sure Google devs know in the abstract that Google search is used by criminals to help them in committing crimes, but that clearly is not illegal in and of itself.
gpm 7 hours ago [-]
There's definitely a mens rea requirement here, that you know that a crime is being committed and that you intend to facilitate it. I doubt it requires particularized knowledge that "this specific request" is for a crime... I'm still not a lawyer.

Running a service primarily for legal purposes that some criminals can take advantage of is pretty different with regards to intent than reviving an old domain name that you know is primarily used by old illegal torrents as a tracker.

I spent a few minutes googling, and it seems like that at least as of a decade ago the exact bounds here weren't well defined: https://www.scotusblog.com/2014/03/opinion-analysis-justice-...

> Finally, the possible liability for an “incidental facilitator” – such as a firearms dealer who knows that some customers will use their purchases for crime – is noted but not resolved. Thus, thankfully, there is still some fertile ground for hypotheticals with which we practicing law professors can bedevil our students.

drob518 7 hours ago [-]
IANAL, but I would think you’d also have to have specific mens rea. That is, it’s not illegal to use a torrent or facilitate a torrent, because it’s just a protocol that can be used for good or bad. If you were hosting movies and songs, whatever the protocol, that’s when you’re specifically engaging in piracy. It’s sort of like driving a car isn’t illegal, but being the getaway driver for a bank robbery is, even if you never enter the bank. The car isn’t the problem, it’s what you are using it for. It’s also not illegal to sell a car to a bank robber, even if that’s a possibility, unless you reasonably believe that the particular person you were selling it to is a bank robber and will be using it to commit a crime. The mere fact that somebody could use your tracker for piracy doesn’t loop you into the conspiracy unless you specifically know that they are committing piracy. This is why the telecom companies all have carve outs for this sort of thing. Carrying packets or voice traffic of someone planning a crime doesn’t loop the telecom company into the conspiracy.
gpm 6 hours ago [-]
I'm not saying it's illegal to "run a torrent tracker". When Blizzard use to (pre 2015) update Starcraft via torrent I assume they ran their own tracker for that, and that was totally legal. Even if there was some way for a pirate to take advantage of the Blizzard tracker.

Here it's not the "mere fact that somebody could use your tracker for piracy". It's that you're literally observing that a bunch of old mostly-piracy torrents are pointing at this domain, and then deciding to turn this domain back into a service which assists in that piracy.

KomoD 6 hours ago [-]
> It's that you're literally observing that a bunch of old mostly-piracy torrents are pointing at this domain, and then deciding to turn this domain back into a service which assists in that piracy.

He doesn't know if they're mostly piracy or not, all he sees is a hash and the peers.

gpm 5 hours ago [-]
He did not choose the domain name by chance. He chose it because he observed it was previously in use as a tracker for copyright infringing torrents.

The police/courts/jury is not obliged to put blinders on just because you would prefer if they did.

The mere fact that the domain name was previously used for this is almost certainly probable cause to get search warrants that will almost certainly provide the requisite proof beyond a reasonable doubt that he has in fact intentionally both committed himself, and aided others in committing (because he knew what the domain name was, or at least recognized it as similar to demonoid and could guess), copyright infringement. And that's without the blog post... (which I assume in the hypothetical where he chose to keep running this he would not have posted).

drob518 6 hours ago [-]
Exactly.
rvnx 8 hours ago [-]
Well Google has knowledge about it, but once you reach a certain scale you become safe (e.g. OpenAI with copyright infringment)
awesome_dude 7 hours ago [-]
IANAL, but I would think that Google's customers are overwhelmingly using the service for "legitimate" activities, and Google makes attempts to limit use of their tools in the commission of a crime.

It's kind of like Kim Dotcom's defence of his systems where he was saying that he was making attempts to remove content from his systems in compliance with DCMA requests. That is, the claim is his systems were legal because even though people were using them for illegitimate purposes, he was actively working to prevent that from happening.

7 hours ago [-]
diggan 7 hours ago [-]
> knowingly helping people commit crimes generally

Right, that makes sense. Is running a tracker "knowingly helping people commit crimes"? I feel like that's a huge jump, there is a wide range of content coordinated by trackers and the DHT.

gpm 7 hours ago [-]
It's not like he just started a random new torrent tracker... he took over an old domain that was previously in use by people pirating stuff after observing that torrents were still pointing to the tracker and ran a tracker on that domain. That's a pretty direct line to "he knew this would be used for copyright infringement".
os2warpman 7 hours ago [-]
[flagged]
8 hours ago [-]
senko 7 hours ago [-]
But the OP states he was using the tracker for lawful purposes:

> So I was, uh, downloading some linux isos, like usual.

Nothing to see here, move along.

Seriously though, the OP makes the same argument and concludes that:

> I was spooked. [...] I shut down the VPS and deleted the domain quickly after confirming it works.

IANAL but this clearly shows the OP didn't intend to facilitate crime and shut it down after seeing that was what may have been happening.

gpm 7 hours ago [-]
I, and I think OP, were both addressing the hypothetical in which he continued to run the service, not the reality where he quickly shut it down.

> But the OP states he was using the tracker for lawful purposes:

That quote is a confession that he was committing copyright infringement. Courts and juries and not obliged to ignore the ", uh," part.

Probably (in the very unlikely event where he is charged) the best defence would be "this was a joke" not "I didn't literally confess to committing copyright infringement". Even then I'm pretty sure this quote would weigh against him substantially in just about any jury's mind.

senko 7 hours ago [-]
> That quote is a confession that he was committing copyright infringement.

I know, "linux ISOs" has always been a joke "rationale" :)

I do think we're in agreement.

KomoD 7 hours ago [-]
(IANAL) It can be both legal and illegal

If you don't respond to takedowns, that's probably leaning towards being illegal*

If you respond to takedowns and blacklist the hashes, you're most likely fine*

*obviously depends on the jurisdiction and on whether matching hashes to IP:PORT is considered distribution/facilitation/whatever (take TPB's case as an example)

I know someone who ran a pretty large tracker for years, when he received a takedown he just blacklisted the hashes and he's been fine so far.

numpad0 7 hours ago [-]
Because music & movie industries hate P2P in general? That basically killed P2P dead in 2000s as it was becoming the next generation of decentralized Web.

Maybe it's about time to revisit it? It's just the matter of how to enforce DRM. They shouldn't care in this day and age with plenty ways to get licensing sorted out.

anilakar 3 hours ago [-]
Yeah. There are trackers (hosts used for coordination between bittorrent peers) and there are "trackers" (sites used for hosting .torrent files and magnet: URIs). Takedowns have been targeted exclusively at the latter.
leijurv 8 hours ago [-]
OP did actually host a tracker.

"I then started the tracker. After about an hour, it peaked at about 1.7 million distinct torrents across 3.1 million peers!"

jedberg 8 hours ago [-]
Do you think the police understand this nuance? Especially since most of the traffic that will go through there is probably copyright infringement?

They'll just see tracker and assume it's illegal.

SXX 8 hours ago [-]
> Especially since most of the traffic that will go through there is probably copyright infringement?

Copyright infinging materials dont go "though" trackers. Trackers only keep torrent hashes and lists of peers.

jeroenhd 5 hours ago [-]
So do torrent websites like the pirate bay. That doesn't protect pirates from getting sued to hell and back or even receiving prison sentences from the court.
jedberg 5 hours ago [-]
I'm well aware of how trackers and torrents work. But again, do you think law enforcement understands the nuance of that?

Also the government and private companies have argued in the past that the hashes and lists of peers is inducement and enablement for copyright infringement.

hungryhobbit 8 hours ago [-]
Do you think the police are actually policing the internet?

Even if you didn't mean your local police, and meant a national body like the FBI, the truth is they focus on other crimes (eg. child abuse), and even then they are woefully unable to handle even most of those crimes.

The vast, vast majority of copyright enforcement comes from copyright holders ... not the internet copyright police.

jedberg 8 hours ago [-]
Of course not. But first a copyright holder tells the police, and then the police enforce it.

The police rarely find crimes on their own -- they are almost always acting on a request from someone else.

nneonneo 7 hours ago [-]
Now I'm wondering: with the wide range of bittorrent clients out there, and the fact that many are written in unsafe languages, could it be possible for some of them to be exploited through a malicious tracker? It would not surprise me if some of these clients misbehave if fed malformed data from a tracker.
treyd 5 hours ago [-]
Most torrent clients that people use (though not all) are actually wrappers around libtorrent, which is very well tested and has even been audited.
userbinator 41 minutes ago [-]
Possible but unlikely. The protocol is relatively simple, and what clients are out there have already been subjected to tons of untrusted input.
asa400 6 hours ago [-]
I've written hobby-quality clients and I think the answer is yes. First, you're dealing with input from a server you don't control, and second, you're doing quite a bit of interaction with the filesystem. It's hard enough to write a functional client in a memory safe language, getting it correct in C or C++ is bound to be pretty tough.
ethan_smith 2 hours ago [-]
Transmission had a remote code execution vulnerability (CVE-2018-5702) through DNS rebinding that allowed attackers to execute arbitrary commands - tracker exploitation is definitely a real attack vector.
AzzyHN 3 hours ago [-]
Think about how many other programs are written in not-rust. You're worrying over nothing (or, alternatively, you should be worried about just about everything)
fshafique 5 hours ago [-]
That's what I was hoping the author would explore.
jldugger 6 hours ago [-]
In other words, you can DDoS any ip for the cost of registering a domain and publishing a specific DNS record.
57473m3n7Fur7h3 5 hours ago [-]
Is it really going to be all that bad?

The BitTorrent clients I’ve used all seemed pretty polite, backing off for like 60s at least for each tracker they can’t connect to.

If you buy one of the dead tracker domains and point it at an IP of someone else, but their services aren’t even listening on the port client wants to connect to (and don’t speak BitTorrent even if the port happened to coincide), I can’t imagine that even with a million BitTorrent clients wanting to connect it would really be all that much of a problem.

jldugger 48 minutes ago [-]
It can be: https://www.jwz.org/blog/2015/01/chinese-bittorrent-the-gift...
5 hours ago [-]
daneel_w 4 hours ago [-]
Common clients' announce interval is pretty long (usually 30 minutes). Then again, 3M peers makes for some volume...
haunter 7 hours ago [-]
There is a tracker masterlist here updated daily so you can find another dead ones probably https://github.com/ngosang/trackerslist
8982143448 4 hours ago [-]
[flagged]
jedberg 8 hours ago [-]
This is like when cloudflare picked up the IP address 1.1.1.1. They saw a ton of traffic to it as soon as it went hot, because a bunch of people had scripts pointing at it.
waymon 4 hours ago [-]
How did they get that address?
jedberg 4 hours ago [-]
“ APNIC's research group held the IP addresses 1.1.1.1 and 1.0.0.1. While the addresses were valid, so many people had entered them into various random systems that they were continuously overwhelmed by a flood of garbage traffic. APNIC wanted to study this garbage traffic but any time they'd tried to announce the IPs, the flood would overwhelm any conventional network.”

https://blog.cloudflare.com/announcing-1111/

ck45 7 hours ago [-]
My first thought is, how many BitTorrent clients have vulnerable parsing code? Could a malicious actor register the domain and infect clients?
EvanAnderson 6 hours ago [-]
I'm thinking of the Jon Evans novel "Invisible Armies" and the "bug" / backdoor in the P2P software that it's author users to pwm machines.
SSLy 7 hours ago [-]
utorrent v2.1 is still widely used by too many people, and it certainly is exploitable.
jauntywundrkind 8 hours ago [-]
I actually ran a very-short-lived private use tracker briefly, for some exploration doing p2p watch partying. But it was a toy, never got serious enough to look deeper at how the tracker worked (was using the rust Aquatic tracker, which kindly added webtorrent support on request! https://github.com/greatest-ape/aquatic )

Does the tracker know what it's tracking? Is there any attempt to make the tracker unaware of what peer rendezvous it's doing?

My gut is that it seems some kind of hash/magnet that folks are asking to peers on. And that the magnet itself is sufficient, and doesn't have to include anything identifying (although I believe many magnet links included some human readable description). The tracker could likely try to download this hash from the peer itself, to get the torrent info, but wouldn't really know what the torrent is or what's in it without doing the download itself.

Does that check out? How much of the magnet link is key to rendezvous? Could a tracker ignore human friendly fields, block them at ingress, to shield it's eyes?

daneel_w 4 hours ago [-]
The trackers only deal with torrents' info hash. No names, no descriptions, no list of contents, no nothing. opentracker, to use OP's chosen software as example, can run in both white- and blacklist mode (or whatever equivalent terminology it uses today). The former is self-explanatory, and the latter allows all hashes except the blacklisted ones. All open trackers, such as torrent.eu and opentrackr.org to name a couple, always operate in a blacklist fashion in order to openly accommodate any users to congregate for (almost) any content.
qingcharles 4 hours ago [-]
The tracker knows what it is tracking. I used to run a TV show tracker. It would keep track of all the users upload/download ratios.
aeyes 2 hours ago [-]
The blog post is about a public tracker. What you describe is a private tracker which embeds a client identifier into the announce URL of the torrent.

On a public tracker the only way to identify a user is the IP address and that's not reliable.

mystraline 6 hours ago [-]
That's easy. Register the domain in Russia, China, Iran, or similar country. Run the website in Alibaba.

Let them attempt to send legal toilet paper to Russia or China. I'm sure that will end well.

aidenn0 8 hours ago [-]
IANAL, but my understanding is that running a content-neutral tracker is legal in the US.

In other jurisdictions it most certainly is not, and the VPS maybe in a different jurisdiction and the .si TLD definitely is.

jrochkind1 6 hours ago [-]
Googling, there's been at least one tracker shut down by US law enforcement, EliteTorrents [2005] https://www.latimes.com/archives/la-xpm-2005-may-26-fi-torre...

I think there have probably been more. There are definitely more that had civil suits with MPAA etc suing for damages.

It may be somewhat harder to make the case in the US, but a tracker where a great majority of what's listed is copyrighted, I'm pretty sure it can be shut down in the US.

NoMoreNicksLeft 5 hours ago [-]
Was that the actual tracker and tracker only, or was there a web front end that hosted all the torrent files and forums and so forth? Because the latter will make you a big target.

God I miss rarbg. And KAT.

komali2 38 minutes ago [-]
A lot of the best torrents are now on private trackers in my experience. I'm not clear why, but observing the communities involved, members seem to take great pride in e.g. well formatted e-books, well organized audiobook files, creating different resolutions and compression rate variations of a movie or tv show, and I suppose want to keep those in the community?
jrochkind1 4 hours ago [-]
I'm curious the nature of the US laws that would make the web front end illegal (or subject to civil penalties?) but not the tracker?
anal_reactor 2 hours ago [-]
> God I miss rarbg. And KAT.

I miss shit being worth torrenting. Maybe things have changed, maybe I grew up, but:

1. Most utility software you need is free, save for a few programs you can easily find on Russian torrents.

2. Most games and other media are slop.

Torrents didn't die because US law enforcement made them die. Torrents died because most companies realized that providing slop with ads and lootboxes for free is a much better business model than trying to get people to pay for something of quality.

Imagine trying to tell someone in year 2000 that Windows will natively display ads, EA will lose lawsuits related to FIFA being actual old-fashioned gambling, and music industry will push for AI-generated content. Yet somehow we accept this as completely normal in 2025. No wonder nobody ain't torrenting shit.

lossolo 6 hours ago [-]
I remember the day they shut down ET. It was because they released some major blockbuster movie before its premiere.
trinix912 5 hours ago [-]
There used to be a large public tracker running on .si, used widely in Slovenia where .si is from. Almost everyone who's been online in the last 20 years in Slovenia knows of or has used it. It also didn't disappear because of legal notices.
ZYbCRq22HbJ2y7 7 hours ago [-]
VPS is from https://cockbox.org/ (as referenced in the article), which says it is based in Moldova?
avidiax 1 hours ago [-]
Why not forward to another open tracker? Then you host nothing, and any legal letter you receive you can just tell them to talk to the open tracker.
zaik 8 hours ago [-]
I wonder how many anti-torrent groups are doing this covertly.
sweeter 7 hours ago [-]
Definitely a few. Media companies often send out infringement notices to ISPs to be forwarded to the user and I would guess this is how they get those IPs
mdaniel 7 hours ago [-]
My understanding is that mere swarm membership is sufficient, no need to host anything

That's my understanding of why private trackers ban folks who upload private .torrent files to public trackers because the infohash is a rendezvous point of private and public consumers via DHT

accrual 7 hours ago [-]
It's kind of like walking into a room of people with full or partial copies of a copyrighted pie, but there's one person in the corner (the copyright holder or someone on their behalf) taking notes of everyone who comes and asks for a slice.
komali2 34 minutes ago [-]
When I moved out of my apartment I needed to transfer the Comcast account to my roommate. In the process of logging into their web dashboard for the first time since I'd started the service, I found out I had an @comcast.com type email address, apparently registered for me. The webmail UI indicated I had thousands of unread emails. I was curious what kind of spam gets sent to an email address that's so far as I'm aware never out on the internet anywhere, so popped it open.

Thousands of DMCA requests. Full filenames. Over the course of a year they had apparently notified Comcast of thousands of alleged violations, and nothing more than an email ever came of it.

Impossible to know which roommate was allegedly torrenting files of course. Or perhaps people visiting using our wifi. Who knows!

neckro23 7 hours ago [-]
No tracker necessary, you can just use DHT: https://iknowwhatyoudownload.com/
edude03 6 hours ago [-]
huh, weirdly it has stuff I did download and stuff I didn't download within minutes of each other ... should I be worried?
_factor 2 hours ago [-]
Many trackers will add dummy data to prevent profiling. There is no validation to claims. It’s nice to look at, but not reliable.
lossolo 6 hours ago [-]
Stop using DHT and/or public trackers and you will be safe. They scan public trackers and the DHT network.
edude03 3 hours ago [-]
Sorry, should have been more specific - I don't care if people know what I downloaded - I just wonder how stuff I definitely didn't download is attributed to my IP address. Can't be that my dynamic IP address changed, because of the small time between stuff I did download and stuff I didn't. So then, is the scanner wrong, or do I have rouge device(s) on my network?
NoMoreNicksLeft 5 hours ago [-]
>Stop using DHT and/or public trackers a

Public trackers are the only trackers most of us can reasonably use. He should get a VPN.

edm0nd 4 hours ago [-]
private trackers and warez groups are the plentiful (IPTorrents, Speed, etc) if you are a good seeder and can maintain good ratios. anyone using a public tracker in 2025 deserves anything their ISP catches them doing imo.

public trackers and torrent sites are also just 90% malware and RATs.

DaSHacka 3 hours ago [-]
> anyone using a public tracker in 2025 deserves anything their ISP catches them doing imo.

Or you could just use a VPN, which you probably should for private trackers too anyway.

NoMoreNicksLeft 3 hours ago [-]
>private trackers and warez groups are the plentiful (

Sure. It combines all the fun of pledge week with a fraternity with the wrong-headed attitudes that became part of the culture when ftp servers were the height of technology. And you just have to schedule an interview and learn the secret knock/handshake. Don't ever invite anyone, because if they're the wrong type, you get banned for their behavior too.

>public trackers and torrent sites are also just 90% malware and RATs.

It's an mkv file. Don't double click exes.

heraldgeezer 5 hours ago [-]
Use a VPN? Like a public one. Mullvad recommended.
Scoundreller 5 hours ago [-]
Is there a chance if someone bought suprnova’s domain (if available), which closed in 2004, someone could finish their download if a seed were still active? Does it matter if this was pre-DHT, or does DHT go historical to cover old stuff?
parliament32 5 hours ago [-]
Yes DHT is "historical", in the sense that it doesn't care about when your torrent was created, just the infohash.

However, most torrents created for private trackers have the "private" flag enabled, which excludes them from DHT and PEX and a few other things. You can remove this flag yourself, but you're depending on a seeder doing the same for DHT to work.

nneonneo 5 hours ago [-]
DHT works as long as the client is configured to use it, so if that old seed upgraded their client they might end up automatically sharing the metadata over DHT.
qingcharles 4 hours ago [-]
Yes, this should work, in theory.
iaaan 6 hours ago [-]
I wonder if there are any known vulnerabilities in various torrent clients' handling of tracker responses, e.g. buffer overflows. One could potentially amass a pretty large botnet.
lucascacho 8 hours ago [-]
Seems like the perfect opportunity for a FBI honeypot
jasonjayr 8 hours ago [-]
Isn't that one of the first things they do when they identify + take down a site hosting CSAM?
rickcarlino 6 hours ago [-]
Why didn’t they use a protocol like Gnutella to serve as a non-centralized tracker? Or did they?
ZYbCRq22HbJ2y7 7 hours ago [-]
Some history on the original tracker:

https://torrentfreak.com/demonii-torrent-tracker-shuts-down-...

https://torrentfreak.com/mpaa-we-shut-down-ytsyify-and-popco...

WithinReason 8 hours ago [-]
Can you do this to create a database of torrents for a torrent search engine?
DaSHacka 3 hours ago [-]
There are existing services like btdig that do this via DHT, I believe.
sweeter 7 hours ago [-]
You don't even have to go that far, you can just use torsniff. But be aware there is a lot of nsfw material and potentially illegal material for all I know.
thunderfork 7 hours ago [-]
[dead]
4 hours ago [-]
prettyblocks 7 hours ago [-]
Not a lawyer, but I think intent is a big part of legality and I hope that doing something like this for research purposes should be relatively safe.
1970-01-01 7 hours ago [-]
If done in good faith[1], this is allowed.

[1]https://www.justice.gov/archives/opa/press-release/file/1507...

sergiotapia 6 hours ago [-]
Bittorrent is such a beautiful technology, solves a real problem easily, and helps many many people. It's a shame it's been stifled so much by lawyers.
jensenbox 6 hours ago [-]
As far as I am aware, there are legitimate uses for this technology.
layer8 6 hours ago [-]
> So… the domain is available now.

Not really? OP seems to want to sell it for $10000: https://www.dynadot.com/market/user-listings/demonii.si

k-ian 6 hours ago [-]
yeah turns out Dynadot enforces a 7 day wait on deleting the domain and it's only been 6 days. should be free for registration on June 18 (i assume in 3 hrs if they mean UTC)
whalesalad 2 hours ago [-]
Replace that Dynadot link with your referral code! I interface with a lot of domain registrars and they are one of the good ones.
almosthere 5 hours ago [-]
Dead Internet theory
yieldcrv 4 hours ago [-]
You can pay for seed boxes with Monero

Lawsuits are civil and wont have all the power to find you in all way, compared to a criminal suit or intelligence agency

So the privacy vectors necessary are more limited

abigail95 5 hours ago [-]
interesting choice of hosting provider...
ivanjermakov 8 hours ago [-]
I think some commenters here missed the point.

Of course hosting a tracker is legal, but what about "hijacking" inactive resource?

ascendantlogic 7 hours ago [-]
The word "hijacking" in this scenario would only be applicable if the domain was still registered and active and he forcefully took the domain away. That is not the case. The fact OP was able to register it quickly and easily indicates it was unused and to call this "hijhacking" would imply permanent ownership of domains even after previous owners knowingly let the registration lapse.

The legality of hosting a tracker isn't obvious, and as pointed out elsewhere the nuance is less about concrete legality and more about having the resources to deal with lawyers harassing you with lawsuits.

nektro 5 hours ago [-]
why did you shut it down?
xyst 8 hours ago [-]
Not illegal. But most people without resources to fight off the thinly veiled, strongly worded legal letters would probably fold under this light pressure.

Interesting, but I suppose it’s not surprising to see clients still holding references to old/defunct trackers. Those peers this person discovered once the tracker was resurrected are more than likely to be seed boxes. Maybe a few real clients if they found an old .torrent link and have left it open.

Thanks to DHT (trackerless peering), trackers have become mostly defunct.

fine_tune 8 hours ago [-]
You bought a house that had a murder X years ago and are wondering if your guilty for the murder, probably not - aslong as you don't do more murder in it.

I suppose real life is more interesting though, the guy who picked up the domain to stop the global ransomware crisis was picked up after Defcon if memory serves.

Ironically your probably at more risk from the GDPR for leaking those IP addresses that connected to the box via your blog post.

I'm not a lawyer/solicitor though, don't take my advise.

markasoftware 7 hours ago [-]
the guy (marcus hutchins) wasn't arrested for registering that domain, he was arrested for allegedly creating an unrelated piece of malware.
KomoD 7 hours ago [-]
> I suppose real life is more interesting though, the guy who picked up the domain to stop the global ransomware crisis was picked up after Defcon if memory serves

That dude developed and sold banking malware, that's why he got arrested.

zht 8 hours ago [-]
I think it's more like you buy an abandoned house where people used to go buy drugs

you buy the house and people are still coming knocking on your door asking you if you have any drugs to sell

you're not doing anything wrong, but if the police notice people constantly coming to your house to buy drugs they may do something about it

rvnx 8 hours ago [-]
Other perspective: It's more like you reopen a public place where people were known to publicly harm copyright owners and you provide technical help so they can do it again.
8 hours ago [-]
gpm 8 hours ago [-]
This guy didn't just buy the haunted house that previously had signs directing serial killers to where the victims are, he also reinstalled the signs and opened it back up to the public knowing that the serial killers were still around and reading the signs.

I mean, it's a bit absurd to compare copyright infringement to murder, but that's where your analogy started. He didn't just by the domain and do something innocent, he actually started running the software that helps people pirate things strongly suspecting that pirates would use it to help them pirate things... and then when he observed that was reality he (smartly IMO) shut it down.

waynesonfire 7 hours ago [-]
wow, brilliant.
jmyeet 7 hours ago [-]
I have a theory that BitTorrent is used as a command and control mechanism for botnets.

We've seen various methods of botnet and malware control like rotating domain names that were successfully reverse engineered and used to trigger a kill switch for WannaCry, famously [1].

BitTorrent is known to be resilient, particularly if you use multiple trackers, proxies, etc that are all built into the infrastructure.

[1]: https://www.wired.com/2017/05/accidental-kill-switch-slowed-...

aaron695 5 hours ago [-]
[dead]