Resurrecting a dead torrent tracker and finding 3M peers
Legality vs. Risk of Running / Reviving a Tracker
- Many argue a bare tracker is “content‑neutral” and likely legal in some jurisdictions, especially if it honors takedowns and blacklists hashes.
- Others stress that the real issue isn’t strict legality but lawsuit risk: cease‑and‑desist letters, DMCA notices, and expensive civil litigation can be ruinous even if you ultimately win (“the punishment is the process”).
- Several see a strong chilling effect: fear of copyright lawsuits discourages technically legal experimentation.
- There’s disagreement on how “aiding and abetting” applies:
- One side notes that knowingly facilitating piracy via a well‑known piracy domain could be seen as intent.
- Another side emphasizes high criminal burden of proof and the general legality of dual‑use infrastructure (like ISPs, search engines).
Trackers vs. Torrent Indexes and Intent
- Distinction is made between:
- Trackers: simple peer coordination by infohash.
- “Trackers” as websites: indexes, metadata, search, communities.
- Enforcement historically focused on the latter, where inducement and clear knowledge of infringement are easier to show.
- Some argue reviving a known piracy tracker domain after observing legacy traffic signals intent; others counter that the tracker only sees hashes and IPs, not the underlying content.
Jurisdiction, Enforcement, and Honeypot Concerns
- Copyright enforcement is said to be driven mainly by rights holders, not police, via DMCA and ISP complaints.
- Examples are mentioned of US tracker shutdowns and the role of domain/TLD/VPS jurisdiction (US vs. Moldova vs. “run it in Russia/China/Iran”).
- A few suggest an FBI or rights‑holder honeypot is an obvious use case; others note such tactics are already used via DHT and swarm monitoring.
Technical Behavior: Persistence, DHT, and Hijacking
- Commenters are struck by how many clients still pinged a long‑dead tracker, analogous to stale NTP or 1.1.1.1 traffic.
- DHT and multi‑tracker lists mean swarms usually survive even if one tracker dies; old torrents can still be found years later.
- Reviving dead tracker domains could:
- Enable large‑scale DDoS by pointing DNS at arbitrary IPs.
- Redirect DMCA complaints to innocent residential IPs.
- Be used to map or index torrents (similar to DHT crawlers).
Security and Exploit Potential
- Multiple people wonder if malformed tracker responses could exploit buggy clients; some note prior remote‑code‑execution issues in clients.
- Libtorrent and fuzzing are cited as partial reassurance, but older/unsafe clients are seen as plausible targets.
Broader Reflections on BitTorrent
- Several lament that legal pressure wiped out small, high‑quality, niche trackers more than mass‑piracy sites.
- Others note P2P never truly died (private trackers, seedboxes, file lockers, DHT), and praise BitTorrent as foundational tech that influenced later decentralized systems.