Private Internet Access is primarily a VPN provider. We’ll talk a bit more about VPNs later in this post, but what we really want is the SOCKS5 proxy that comes with their VPN service. So, head to Private Internet Access’ web site and sign up for their VPN service. We recommend starting out with a monthly plan to see if you like it before buying a whole year’s subscription.
Advertisement
Once you’ve signed up, Private Internet Access will email you your username and password. Log into the system with those credentials, and change your password from the client control panel.
Step Two: Generate a Proxy Password

Advertisement
Your account credentials are only to manage your account—we’ll need a new set of credentials for the Proxy service. In the client control panel, click the “Generate Password” button under “PPTP/L2TP/SOCKS Password.” This is what we’ll be using to configure our BitTorrent client. Write down the username and password that appears here (it’s different than your regular account credentials) and move on to step two.
Step Three: Configure Your BitTorrent Client

Advertisement
Next, open up uTorrent and head to Options > Preferences > Connection. Under Proxy Server, choose Socks5 under “Type” and enter the following information:
- Proxy Type: Socks5
- Proxy Host:
proxy-nl.privateinternetaccess.com
- Proxy Port: 1080
- Username: Your Private Internet Access Proxy username (from step two)
- Password: Your Private Internet Access Proxy password (from step two)
Check all of the other boxes under “Proxy” and “Proxy Privacy.” Your Connection preferences should look exactly like the image above.
Advertisement
Step Four: See If It’s Working

Advertisement
To ensure that it’s working, head over to Torguard’s IP Checker. This site can tell you what your IP address is, and compare it to the IP address of your torrent client, which will let you know whether your proxy is working correctly. To test it, hit the “Generate Torrent” button, and open the resulting torrent in uTorrent. Then, go back to your browser and hit the Refresh button under the “Check IP” tab. If it’s the same as your browser IP—which you’ll see next to the Refresh button—then your proxy isn’t working, and you’ll want to double-check all of the above settings. If it shows a different IP address (which should be in the Netherlands), then Private Internet Access is successfully tunneling all your traffic for you.
Other Ways to Anonymize Your BitTorrent Traffic
A proxy like Private Internet Access is the most convenient way to anonymize your traffic, but it isn’t the only way. If you want to try something else, here are a few other tricks we recommend.
Advertisement
Use a VPN
A virtual private network (or VPN) is very similar to a proxy, but instead of rerouting just your BitTorrent traffic, it reroutes all your internet traffic. For some people, that’s a good thing—it gives you privacy all over the web. However, it can also be inconvenient, navigating you to different web pages for that VPN’s country or causing issues with streaming services. If you have a NAS, you can set up your VPN on it to route only your NAS traffic, which is a perfect option for downloading anonymously. VPNs are about the same price as most proxies, and I personally have found that I get better speeds with most VPNs than I do with a proxy.
Advertisement
So which VPN should you use? Check out TorrentFreak’s list of the best VPNs for BitTorrent, as well as our Hive Five on the subject to find a provider that works for you.
Advertisement
Rent a Seedbox
Unlike proxies and VPNs, seedboxes don’t route your BitTorrent traffic through another country. Instead, you actually rent a dedicated server that resides in that country, and do all your torrenting through that machine. They usually have insanely fast speeds, and if you’re on a private tracker, they’ll seed 24/7, giving you a great ratio. Once you download a torrent on your seedbox, you can just connect to it via FTP and download the file as fast as your home connection allows. Note that seedboxes also require a bit of extra setup, and some may require a little command line work to get running.
Advertisement
Seedboxes are more expensive than proxies and VPNs, ranging from entry-level boxes at $10 or $20 a month to fast boxes with more storage at $50 or even $100 a month. But, it offers a lot of advantages over proxies and VPNs—if you have the money to spare and want super fast speeds and a good ratio, we highly recommend getting a seedbox. Providers like Whatbox, Feral, and Bytesized come highly recommended, but a bit of searching can provide you with a ton of options. Shop around and see which one’s best for you.
Advertisement
Ditch BitTorrent Altogether
Your last alternative is to try a new file sharing service entirely, like Usenet. It offers encrypted connections and doesn’t connect to peers, so others can’t track what you’re doing. It doesn’t always have the selection that BitTorrent has (depending on what you’re downloading), but it offers a ton of other advantages, most notably higher speeds and better privacy. Check out our guide to getting started with Usenet to see if it’s right for you.
Advertisement
Images remixed from Simon and lynea (Shutterstock).
Advertisement
Source of this news: https://lifehacker.com/how-to-completely-anonymize-your-bittorrent-traffic-wit-5863380
Related posts:
"It's definitely possible that some evil advertiser could use this to augment their data sets," Green says. "But, gosh, it really requires a lot of evil. And it seems to me like a small case."Keeping...
(Bloomberg) -- China plans to tighten oversight of e-commerce companies like Alibaba Group Holding Ltd. and Pinduoduo Inc., including by holding them accountable for intellectual property violations....
Rick Edmonds, the new media business analyst at the Poynter Institute in St . Petersburg, Florida, said Bainum looked like there was hinting he might establish a non-profit, digital-only startup ...
By Sawzag Simpson (November 5, 2021, 11: 47 PM EDT) -- A Texas federal government jury ruled that a Lithuania-based proxy server network managed knowingly infringe patents toted by an Israeli pla...
The Internet isn't many private or secure website. In fact , there are eyes everywhere: governments, internet service providers, global companies, cyber criminals and many other gangs. One of t...
Ads are a core part of any free-streaming service. Everyone has to make money in some way, right? But the annoying part of Twitch is that you have no way to skip ads. You can buy Twitch subs, but it ...
This guide features different workarounds you can try if the Ubisoft Connect app is not working on Windows 11/10. Ubisoft Connect is an ecosystem for Ubisoft games and helps different players to conn...
While VPNs are sucking up all the oxygen in the privacy conversation, there is a similar technology that hasn't gotten the same attention: the humble proxy. We asked experts from two leading VPN comp...
News Microsoft Buys Peer5 To Bolster Teams Video Streaming By Kurt Mackie08/11/2021 Microsoft announced on Tuesday the acquisition of Peer5 with the aim of improving "large-scale live video strea...
Proxy servers are beneficial because they act as mediators between your computer and the internet. They make online requests for you, and then they return the requested information. If you want to cr...
White paper systematically examines the attack while showcasing a ‘laundry list’ of new flaws Researchers have released a new fuzzing tool used for finding novel HTTP request smuggling techni...
Recently at EFF’s Threat Lab, we’ve been focusing a lot on the Android malware ecosystem and providing tools for its analysis. We’ve noticed lot of samples of Android malware in the tor-hydra family ...
Photo by Ed Webster from Pexels The internet is vast, and it connects millions of devices. Regardless of who you are and what you do, using a private proxy is beneficial. In recent years, private pro...
To save our system from the outside world, we need a dedicated software platform called “Firewall”. In this article, we will discuss some best-known open-source firewalls based on Linux to protec...
Source: csoonline.com Storage limitations and network capacity leave simple IoT, Internet of Things, devices such as routers highly vulnerable to cyber-criminals. Distributed Denial-of-Service, DDoS ...
PROFESSIONALCOMMUNITY Note: These steps are only necessary if you want to use an external browser for manual testing with Burp. If you prefer, you can just use Burp's embedded browser, which is pre...
The emergence of Microsoft 365 and Azure and the acquisition of Polyrize has led Varonis to launch DatAdvantage Cloud, a solution that classifies and protects data and can stop advanced threats. Va...
<!-- (ucfad_async = window.ucfad_async||[]).push({}); --> The Netflix VPN ban is making its return, and this time Netflix is implementing a double-base strategy to catch rogue users....