averageshade@lemm.ee to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 year agoWhat is the best site to search for torrents?message-squaremessage-square37fedilinkarrow-up141arrow-down10
arrow-up141arrow-down1message-squareWhat is the best site to search for torrents?averageshade@lemm.ee to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 year agomessage-square37fedilink
minus-squareQuikxSpec@lemmy.worldlinkfedilinkEnglisharrow-up2·1 year agoThank you. Does this create any considerable vulnerabilities?
minus-squarejws_shadotak@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoNot typically but it can vary depending on which protocol and which provider you use. Best to check yourself using something like ipleak.net and see if there’s any identifying info on there while you’re connected.
minus-squareQuikxSpec@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoThat’s great. I’ll do some more research on the hardware I have also
Thank you. Does this create any considerable vulnerabilities?
Not typically but it can vary depending on which protocol and which provider you use. Best to check yourself using something like ipleak.net and see if there’s any identifying info on there while you’re connected.
That’s great. I’ll do some more research on the hardware I have also