1

I have seen various sources saying this should not be done, and the argument is that the network cannot handle the load. Fine.

But what I want to ask about is the following: what if someone created a dedicated tor torrent client, that accepts non torrent traffic from the tor network too. The torrenters would get what they want: anonymous torrenting. And the rest of the tor users would get more nodes which participate in the network, increasing both capacity, and traffic to help obfuscate any one users activity.

Seems like a win/win, but I am no expert.

1 Answers1

2

This is a thing... but it's not called Tor. There are a few network protocols that do this stuff. What you describe is probably closest to the I2P network which has torrenting built into it.

You could make a torrent client that also doubled as a Tor Bridge, Relay, Exit node, but most users of it would be pissed to find their torrent-client made them a tor-exit-node with all the legal headaches that entails in most countries.

Point is Tor is a way to gain anonymity by proxying your traffic through volunteers running bridges and relays. The bridges and relays are NOT anonymous, and running one is big flashing light to your ISP.

Not that running a bridge or relay node is not a good thing, or something that could / should be done. It just is not anonymous and making it so requires a different skill set than running a torrent client.

Dan
  • 263
  • 1
  • 4