Hi there

I would like to prevent to the best of my ability getting malware or virus when torrenting. I know there is never 100% certainty of not getting one, but i’d like to mitigate it. I’d like to ask your advice/expertise.

These are the practices I use. Please build on them if you think there is room for improvement and how.

  • First off, I use linux (transmission) and only download media (music, movies), no software. I know this already lowers the risks significantly since most malware are on .exe for Windows, however I am aware mp3/mp4 and mkv files can still embed malware to exploit VLC vulnerabilities and also Linux.

  • I use Proton VPN with kill switch in advanced settings - no internet (at all) allowed when the VPN is not connected.

  • I limit opening the downloaded media in the PC. After seeding for a few months, I usually transfer them into an external HDD and delete them from the PC. Media may be used in a TV/phone for viewing/listening.

  • I have downloaded torrent media going into a separate internal SSD which is encrypted (obviously unencrypted when torrenting). This probably doesn’t do much, but I get somewhat piece of mind when I am not torrenting and the ssd is locked.

  • I use normally pirate bay org and get the torrents with the higher number of seeds.

I understood joining some private tracker may help, but I found it difficult to join. Any advice and recommendations are welcome!

  • so0t8@lemmy.orgOP
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 day ago

    Thanks, really appreciated detailed response. I checked out the websites youshared, and found them really good and actually with more seeds than pirate bay so am definitely moving away from that. A couple of questions if you dont mind. I am currently using Transmission and also the ufw. Do you think what steps I have to take to link it like you said? I am quite noob on this and I can’t find any step that is understandable.

    • B4DR0B0T@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      24 hours ago

      I don’t use Transmission or UFW, I use Area2 (CLI) and IPTables. But from what i know of UFW its just a frontend for IPTables. So firewall rules should be similar. So here are few rules you can try, but I highly recommend you do your research on how to properly use UFW or IPTables with Transmission.

      // This command resets all your existing rules.
      sudo ufw reset
      
      // Block all outgoing and incoming traffic by default.
      sudo ufw default deny outgoing
      sudo ufw default deny incoming
      
      // Allow outgoing connections via VPN interface only.
      // Allow forwarding traffic through the VPN interface tun0
      // Change "tun0" to your VPN interface and 12345 port to your Transmission port.
      sudo ufw allow out on tun0 to any port 12345 proto tcp
      sudo ufw allow out on tun0 to any port 12345 proto udp
      
      // Allow VPN service traffic on your normal interface (exp. eth0 or wlan0)
      // Replace x.x.x.x to your VPN server port and 1194 port to your VPN port.
      sudo ufw allow out to x.x.x.x port 1194 proto udp
      
      // Optionally if you dont want to restrict your vpn per ip/port do something like this.
      // Change eth0 to your network interface and 1194 port to your VPN port.
      sudo ufw allow out on eth0 to any port 1194 proto udp
      
      // Enable your UFW firewall rules.
      sudo ufw enable