Can I just use Socks5 with uTorrent and not install VPN?
Hello:
If a user does not want all their Internet traffic fed through PIA can they use Socks5 alone and accomplish torrenting invisibility using Socks5 without the VPN client. For example, the user may want to use Google maps or other local services that the PIA VPN would interfere with. And, of course, they might not want the additional needless overhead of a VPN running 24/7 or having to turn it on and off constantly.
It's my
understanding that a user can do this using the Socks5 Proxy as discussed in this
thread:
Thanks.
Comments
You should always use the proxy WITH the VPN. The VPN can be used safely without the proxy, but the proxy cannot be used safely without the VPN. And you really need to make sure all applications you care about are actually forced to use the VPN connection only. If you fail this, you will have a very bad experience.
The proxy offers and supports zero encryption, so you will be fully exposed unless you use the VPN. Nonetheless, the choice is yours. Choose wisely.
https://en.wikipedia.org/wiki/RC4
https://en.wikipedia.org/wiki/BitTorrent_protocol_encryption
It has been noted that at current, most of the time brute forcing a RC4 cipher takes a few minutes. And after it has been, the copyright trolls have your information.
Who would do this? Many groups. Media trolls and content sellers have both the means and a good reason to do this if you are ever downloading something they have an interest in. Intelligence agencies do as well. (It provides information that can be used to exploit and/or coerce your cooperation with whatever they need.) And many other groups may want to do this because it is simple enough to do and achievable without a supercomputer.
PIA made no false claims when they said they log nothing. But the torrent clients provide plenty of information just to maintain a connection. Not all of it is going to directly reveal your IP, but knowing you are on what particular OS, and then a few simple packets to test what services you have running at the time can reveal who you are.
I suspect your ISP is the last likely attacker. But there are plenty of scammers who will go to great lengths to find information allowing them to threaten you.
I could list hundreds of things that can differentiate a single client here. But it is easy to look through the options and see that reducing or increasing the number of half open connections would be detectable if one had a system setup to attempt connections until they were refused. And speed itself can help determine what ISP you use. For instance, if you can manage speeds that are pretty fast, then it greatly cuts down the number of ISPs you could be using. Your ping time from three different locations can tell where you are within a very small region, even if using the proxy. And that last part cannot be stopped from happening in a number of ways even if you have your system set to disallow ICMP pings.
So in short, what do you think your ISP would do if they were contacted with a legal threat by a media troll to either give up what users they had connecting via for instance a Windows 7 x64 PC via qBittorrent on port 12345 at 3:16PM on a particular day? They may not have the information, but they would surely hand it over if they did. This is why the VPN is so beneficial. They would not know any of that information if you use the VPN, and all is plain to see if you only use the proxy.
Now on to the rest of your post. First of all. The proxy does *NOT* support or allow any form of encryption. Period. The torrent clients can use RC4 themselves, but if they are not told to always do this, they do not. And the encryption is 40 bits strong. It really does take a typical system a few minutes to break so weak encryption by brute force guesses.
Second, the VPN can and does slow things down, and some things will not work. I cannot and would not dare to contest this. But the proxy imperfect as it is, is entirely useless when it goes down. And the VPN stops all traffic both ways when it fails, whereas the proxy failing depends entirely on your torrent client being configured to cut all traffic when the proxy fails. I honestly cannot say I know how reliable it is. It may work equally well, but frankly I doubt it.
I am sure I am missing one or even several issues in this. Please do not hesitate to keep asking until I give satisfactory answers. I am glad to help.
As said, I cannot speak of utorrent. My torrent client is qBittorrent, and I never use the proxy anyway simply because qBittorrent can be bound to the specific interface used by the VPN, so even if the VPN dies, all traffic dies with it.
But I should point out that a court need not be contacted to get your details. As I explained in my example above, a group with the right information needs only to threaten legal action against for example your ISP and the odds are your ISP will try to give them what they have. With most people it is a part of your contract with your ISP that they can collect, and share information on your activity over their network. And if they contact the wrong ISP, it still cost them nothing to threaten them.
Please do not hesitate if you have any further questions.