tl:dr Even with these measures below, can’t my ISP see a lot of downloading on my account which might be enough to raise suspicion of torrenting? Click on the post for a correctly-formatted version!
What else can the ISP see?
What can government spooks see?
I’m in the UK where torrenting seems to be policed and prosecuted (persecuted!) with a heavy hand.
I’d be interested and grateful to hear your opinions on what I do, and on my thoughts on other issues and anything else I’m missing.
Many thanks.
~- I do this:~
~Enable VPN~
Turn on the kill switch – both Internet and App kill switches
Set the highest encryption - Make sure your VPN is set to 256-bit AES encryption so that all your data is as secure as possible.
Use a secure protocol - it’s best to use an OpenVPN protocol, and not PPTP, which is older and not as secure.
Enable leak protection - switch both IP and DNS leak protection on. Can check for DNS leak: https://nordvpn.com/features/dns-leak-test/
Lock the torrent client to your VPN interface/IP. Use a client like qbittorrent which allows you to bind only to a specific interface/set your torrent to only work via network adapter that your VPN uses… Even if the VPN crashes, your client cannot leak anything because it is communicating over a channel which becomes disconnected.
Disable geolocation in browsers and the PC
Do not allow seeding (now permanently set on Qbittorrent: seeding limits set to zero) - sorry about this one, fellow pirates. The UK seems to be bandit country!
Turn PC Wi-Fi off
~- And maybe:~
Use split tunnelling - This keeps some of your online traffic, like torrenting, encrypted with the VPN, and leaves other sites on your regular IP address. It is useful when you need to keep some sites on your normal IP, such as delivery services and online banking.
Turn on obfuscated servers – make sure VPN protocol is set to Open VPN (TCP)And, I haven’t done this because it may be too advanced for me:
~- Advanced measures I haven’t used yet:~
Set up a Linux virtual machine and do all your business from there. There are ways to harden Linux to make no traffic escape, and to force all traffic through the VPN (hint: you still have to allow traffic to go to NordVPN otherwise you will have a hard time connecting)
Theoretically, you can map your VMs network adapter to the VPN tunnel interface on your host. This means that the VM can ONLY talk over the tunnel. The reason I haven’t really done this is because I can’t think of how to make my host NOT use the VPN.
- Problems I can foresee and haven’t seen answered anywhere:
Even with these measures above, can’t my ISP see a lot of downloading on my account which might be enough to raise suspicion of torrenting?
What else can the ISP see?
What can government spooks see?
What do you guys think?