Can You Download Torrent Movies With I2p

(Redirected from Azureus (software))
Vuze
Developer(s)Azureus Software
Initial releaseJune 2003; 16 years ago
Stable release5.7.6.0 (November 2, 2017; 19 months ago)[±][1]
Preview release5.7.6.1 Beta 1 (November 2, 2017; 19 months ago)[±][2]
Written inJava[3]
PlatformJava (software platform)
Size
  • Source code: 9.7 MB
  • Linux: 18.9 MB
  • Windows (x86): 9.1 MB
  • Windows (x64): 9.0 MB
  • Android: 5.4 MB
  • OS X: 10.1 MB
[4]
Available in38 languages[5]
English, German, French, Dutch, Portuguese, Spanish, Swedish, Chinese (simplified), Chinese (traditional), Polish, Finnish, Danish, Italian, Russian, Norwegian, Bulgarian, Brazilian-Portuguese, Czech, Lithuanian, Slovenian, Turkish, Catalan, Galician, Greek, Hebrew, Serbian, Serbian (latin), Malay, Japanese, Hungarian, Romanian, Thai, Korean, Slovak, Bosnian, Frisian, Macedonian, Georgian
TypeBitTorrent client
LicenseGNU General Public License v2
Websitewww.vuze.com

Even though you download torrent file from tor, you will use bittorent/utorrent to download the file and anyone can easily see what you are downloading so I will recommend you to use streaming software like “popcorn time” which stream torrent online and this process is legal.

Step 2 Create Torrent. You have two options with this. You can take a.torrent file you already have along with its data and move it into: ~/.i2p/i2psnark. Or simply move data you wish to seed to the same directory. Here we have a coupon code for cash off a PS3. I want to share this with my mates. Step 2 Create Torrent. You have two options with this. You can take a.torrent file you already have along with its data and move it into: ~/.i2p/i2psnark. Or simply move data you wish to seed to the same directory. Here we have a coupon code for cash off a PS3. I want to share this with my mates.

Vuze (previously Azureus) is a BitTorrent client used to transfer files via the BitTorrent protocol. Vuze is written in Java, and uses the Azureus Engine. In addition to downloading data linked to .torrent files, Azureus allows users to view, publish and share original DVD and HD quality video content.[6] Content is presented through channels and categories containing TV shows, music videos, movies, video games, series and others. Additionally, if users prefer to publish their original content, they may earn money from it.

Azureus was first released in June 2003 at SourceForge.net, mostly to experiment with the Standard Widget Toolkit from Eclipse. It later became one of the most popular BitTorrent clients.[7] The Azureus software was released under the GNU General Public License, and remains as a free software application. It was among the most popular BitTorrent clients. However, the Vuze software added in more recent versions is proprietary and users are required to accept these more restrictive license terms.

  • 1Features
  • 2History
Torrent

Features[edit]

Vuze (classic UI) statistics page

Bridging between I2P and the clearnet[edit]

Vuze is the only client that makes clearnet torrents available on I2P and vice versa. It has a plugin that connects to the I2P network. If the user adds a torrent from I2P, it will be seeded on both I2P and the clearnet, and if a user adds a torrent from the clearnet, it will be seeded on both the clearnet and I2P. For this reason, torrents previously published only on I2P are made available to the entire Internet, and users of I2P can download any torrent on the Internet while maintaining the anonymity of I2P.[8][9]

History[edit]

Azureus[edit]

Azureus

Azureus was first released in June 2003 at SourceForge.net. The blue poison dart frog (Dendrobates azureus) was chosen as the logo and name of the brand by co-creator Tyler Pitchford. This choice was due to Latin names of poison dart frogs being used as codenames for his development projects.

Vuze[edit]

In 2006 Vuze was released as an attempt to transform the client into a 'social' client by a group of the original developers forming Azureus Inc., shortly to be renamed Vuze, Inc. A Vuze-free version of Azureus was released along with Vuze during the beta period. The releases used version numbers 3.0, while the Vuze-free versions continued with the 2.5 release numbers. [10] In addition, some developers voiced opposition to the idea of completely transforming the client.[citation needed] Starting with an unknown version, Vuze was coupled with Azureus. Soon after, 'NoVuze' modified versions were released on The Pirate Bay, and as of September 15, 2008, are available for versions up to 3.1.1.0. On June 16, 2008, the developers of Azureus/Vuze decided to stop releasing versions named Azureus, and complete the name change with the release of version 3.1. The client engine however, remains unchanged as Azureus.

License change[edit]

Up to version 2.5.0.4, Azureus was distributed under the GNU General Public License (GPL); beginning with the version 3 distribution, the license presented upon installation changed. While it still states that the 'Azureus Application' is available under the GPL, completing installation requires the user to agree to the terms of the 'Vuze Platform,' which include restrictions on use, reverse-engineering,[11] and sublicensing.[12] As with many similar licenses, the Azureus licence includes a prohibition on use of the software by people 'under the age of 18.'[13]Allegedly, the TOS only applies to the website, vuze.com, and not the software,[14] however the actual TOS include the application as part of the platforms.[15]

Acquisition by Spigot Inc[edit]

Vuze was acquired by Spigot Inc in December 2010.[16]

Criticism[edit]

Vuze is categorized as adware by Softpedia,[17] due to its inclusion of a Vuze Toolbar for web browsers. Vuze changes or offers to change home page and search and to install a promotional component not necessary for the program to function.[18] However, all adware can be declined by using a custom installation. In February 2010, What.CD and Waffles.fm, two large music sharing sites at the time, decided to ban the use of Vuze.[19]

However, Vuze cites its Softpedia Editor's pick award, having received an editor score of 4 out of 5 from two reviews: One on 23 November 2005[20] and another on 7 February 2012.[18]

Vuze includes built-in support for Tor, an anonymity network. The onion routers are run by volunteers using their own bandwidth at their own cost. Due to the high bandwidth usage caused by the BitTorrent protocol, it is considered impolite and inappropriate by Tor community members to use the Tor network for BitTorrent transfers.[21][22] By default, the Tor exit policy blocks the standard BitTorrent ports.[23]

It also includes I2P support via an official plugin. In contrast to Tor, I2P is built for P2P traffic and encourages its use.

See also[edit]

References[edit]

  1. ^'Changelog'. Vuze Community. Retrieved 2017-12-11.
  2. ^'Vuze - Dev Home'. Vuze Development. 2017-11-02. Retrieved 2017-12-11.
  3. ^Lextrait, Vincent (January 2010). 'The Programming Languages Beacon, v10.0'. Archived from the original on 30 May 2012. Retrieved 14 March 2010.
  4. ^'Azureus/Vuze.com - Browse /vuze at SourceForge.net'. Azureus.Sourceforge.net. Archived from the original on 2013-05-15. Retrieved 2013-05-10.
  5. ^'Vuze FAQ'. Vuze.com. Archived from the original on 2013-07-28. Retrieved 2013-07-24.
  6. ^Azureus' HD Vids Trump YouTubeArchived 2013-10-27 at the Wayback Machine, Calore, Michael (Wired News): (2006-12-04)
  7. ^'SourceForge Top Projects'. Sourceforge.net. Archived from the original on 2012-02-26. Retrieved 2009-07-14.
  8. ^'Vuze Speeds Up Torrent Downloads Through 'Swarm Merging' - TorrentFreak'. torrentfreak.com. 20 March 2015. Archived from the original on 17 October 2017. Retrieved 9 May 2018.
  9. ^'I2PHelper HowTo - VuzeWiki'. wiki.vuze.com. Archived from the original on 20 October 2017. Retrieved 9 May 2018.
  10. ^'Confusion about name change'. Apcmag.com. June 17, 2008. Archived from the original on December 2, 2008. Retrieved July 14, 2009.
  11. ^'Section 8.12'. Vuze.com. Archived from the original on 2009-02-13. Retrieved 2009-07-14.
  12. ^'Section 8.2'. Vuze.com. Archived from the original on 2009-02-13. Retrieved 2009-07-14.
  13. ^'Section 1 and Section 8.10'. Vuze.com. Archived from the original on 2009-02-13. Retrieved 2009-07-14.
  14. ^'Azureus 2 / 3 and Vuze'. AzureusWiki. 2008-06-27. Archived from the original on 2009-07-17. Retrieved 2009-07-14.
  15. ^'Section 0'. Vuze.com. Archived from the original on 2009-02-13. Retrieved 2009-07-14.
  16. ^'Spigot Inc. - Crunchbase'. Crunchbase. Archived from the original on 21 August 2014. Retrieved 9 May 2018.
  17. ^'Download Vuze (formerly Azureus) 4.2.0.5 Beta 03 / 4.2.0.4 Stable Free Trial – A freeware Java based BitTorrent client'. Softpedia. Archived from the original on 2009-02-12. Retrieved 2009-07-14.
  18. ^ ab'Download Vuze'. Softpedia. SoftNews. Archived from the original on 6 July 2013. Retrieved 19 July 2013.
  19. ^'Vuze and Deluge to be banned'. FILEnetworks Blog. 2010-02-20. Archived from the original on 2010-02-23. Retrieved 2010-02-20.
  20. ^'The Torrent Master Is Back'. Softpedia. SoftNews. 23 November 2005. Archived from the original on 6 September 2013. Retrieved 19 July 2013.
  21. ^'doc/TorifyHOWTO/BitTorrent – Tor Bug Tracker & Wiki'. Wiki.torproject.org. Retrieved 2012-10-27.
  22. ^'Why Tor is slow and what we're going to do about it | The Tor Blog'. Blog.torproject.org. 2009-03-13. Archived from the original on 2013-01-28. Retrieved 2012-10-27.
  23. ^'doc/TorFAQ – Tor Bug Tracker & Wiki'. Wiki.torproject.org. Retrieved 2012-10-27.

External links[edit]

Wikimedia Commons has media related to Vuze.
  • Official website
  • Azureus / Vuze on SourceForge.net
  • Vuze on Google Play
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Vuze&oldid=894459177'
Category: darknets
A 11 Minute Read

15 Jan 2014


You've probably heard the term 'Darknet' thrown around a lot. It seems to be a buzzword that either invokes fear or a sense of l33t h4ck3r skills. A lot of this attention has been focused on Tor and hidden services such as the Silk Road, though Tor is only the tip of the iceberg when it comes to 'darknets'. I2P is another large anonymizing network that is similar to Tor, but also has some distinct differences. This tutorial will help remove the confusion surrounding darknets, and will show you exactly how you can get onto one of the best networks out there.

What Is I2P

I2P, short for the Invisible Internet Project, spawned in 2003, and is an anonymizing network that focuses on secure internal connections between users. Tor, on the other hand, largely focuses on allowing users to reach the regular internet anonymously (called the clearnet). In other words, we can think of Tor as being a path to the regular internet, while I2P seeks to create its own internet. In this light, we can already see that these two services are apples and oranges, thus there is no reason to say that one is better than another. Unfortunately this debate regularly takes place.

The result of I2P's focus on creating its own internal internet is that the network isn't accessible from a regular computer, as special software is needed to communicate with other I2P users. With that software installed, however, your computer can join I2P and begin routing traffic, just like a Tor middle relay. By doing this I2P creates a distributed, dynamic, and decentralized network that allows secure and anonymous communications between individuals. I2P also bypasses many censorship efforts and prevents adversaries from determining what you're saying, and who you are saying things to. In fact, because most I2P users also route other people's traffic, it's difficult to tell if you're saying anything at all.

How It Works

I2P is a complex beast with a lot going on under the hood, so this explanation will be a vast, yet useful, oversimplification. If you want a technical explanation rather than a simplified analogy go ahead and give the I2P Technical Documentation a visit, otherwise keep reading.

Think of the mail system. Imagine that you had two mailboxes: one that you receive mail in, and one that you send mail through. Imagine also that your friend Johnny had the same thing, as well as everyone else in your neighborhood. The way I2P works is that if you want to send a message to Johnny you place the letter in your outgoing mailbox addressed to him. Then three neighbors pass the letter off to each-other, with each neighbor not knowing who the letter came from before the person that handed it to them. These people are analogous to what we call a 'tunnel' in I2P.

After the letter reaches the end of this tunnel, it goes to Johnny's tunnel. So it goes to one person, who hands it to another, who hands it to another, etc., until it reaches Johnny. If Johnny want's to send a letter back this process happens in reverse (but with a different set of people handling the messages). This example is extremely simplified, so I'll try to expand on it now that the basic fundamental idea is down.

The first obvious question is why don't you just give the letter to Johnny directly? The answer is that if the letter was sent to Johnny directly and Eve was watching, she'd see it. This is not at all anonymous. By sending it through multiple people we create a large degree of anonymity.

But wait, can't Eve still watch the letter as it is passed from one hand to another? Realistically no, there are too many hops for Eve to actually watch it. Furthermore, with I2P there are thousands of letters being all passed around at the same time, and for Eve to be able to distinguish one letter from another is, for all intents and purposes, impossible. When you send a letter to a neighbor and that neighbor passes it off to another neighbor, on I2P she's also handing hundreds of other letters at the same time. This also adds to security and anonymity because it makes it difficult for attackers to know whether you're handing someone a letter that you wrote yourself, or if you're just passing someone else's letter through a tunnel.

Wait a second, can't one of the neighbors just open the letter and read it on the way through? The answer to this is no. I2P encrypts messages in multiple layers. Imagine a lockbox with six other lockboxes inside. Each time the message goes to the next neighbor, the next lockbox is opened telling that neighbor who to give the lockboxes to next. At the end of the route Johnny gets the final lockbox and opens it to find the message.

Of course this analogy is incredibly basic and limiting to the full understanding of how I2P works, but it gives an idea of the complex mechanisms that are in place. To give a few technical details of how it really works, the messages are encrypted using AES encryption, and authenticated using El-Gamal. Furthermore, one of the differentiating factors of I2P from Tor is the ability to put multiple messages into one encrypted packet, making it harder for an outside observer to find out what's going on. I2P refers to this as Garlic Routing. Also, these inbound and outbound tunnels are constantly changing to ensure that any de-anonymizing attacks have limited time to work. Again, if you're up for some reading and know about networking and encryption, I would strongly encourage you to give the I2P Technical Documentation a read, as simplifying and explaining it is quite difficult.

In short, I2P works by encrypting messages and sending them to a recipient with many hops in between. If you're still confused, here's an infographic which helps explain how I2P works

Features of I2P

1. Email/Messaging

There are a few messaging services on I2P, with the two big ones being I2P's built in email application and I2P Bote.

The built-in mail application lets you email the regular internet to, and from I2P. The mail system has quite a few security features built into it, such as stripping parts of mail headers and delaying outgoing messages to reduce any correlations that could de-anonymize you. While this mail system is leaps and bounds more anonymous and secure than standard email, it is still reliant on the operator who could, at any time, read your emails.

I2P Bote is a messaging service that focuses on secure and anonymous email. It operates only on the I2P network, so you can't send messages to the clear-net. That being said, it does automatic encryption, and allows you to create multiple 'email identities' (accounts) with one click. I2P-Bote is decentralized and stores messages encrypted on the network, meaning that your trust is in strong mathematics rather than an anonymous person. It's beginning to gain quite a bit of popularity and it may be a good choice if you want to communicate with someone securely. Additionally, you can set it up to work with Thunderbird, which I describe here.

2. IRC (Internet Relay Chat)

If you're not already familiar, IRC's are basically chat rooms online, and I2P has an IRC service that allows users to chat anonymously. The I2P IRC channels are full of some extremely intelligent people that spawn some great discussions, interspersed with hilarious sarcasm. I've never been a huge IRC user, but I2P chats stand out as some of the best you'll see. The best part is that I2P's anonymity offers a near-perfect sense of freedom of speech. Often controversial topics are talked about in these channels, but nobody is afraid of offering what may be a very valid, but unpopular opinion, pushing you to explore new ideas from new perspectives. If you end up using I2P, I'd definitely check out the IRC. Two of the best rooms are #salt and #i2p-chat, and you can connect to them by setting your IRC client (such as X-Chat) to 127.0.0.1 on port 6668.

3. Eepsites

Eepsites are the I2P equivalent of a Tor Hidden Service: they are websites hosted on the I2P network, whose operators can be anonymous. Like hidden services, these sites cannot be connected to off the I2P network. Unlike Tor hidden services, their web addresses are actually readable, with the domain of .i2p at the end. For example, salt.i2p is an eepsite which 'is a gathering space celebrating crypto and infoanarchy', and is only available on the I2P network. These Eepsites may not be of huge interest to many, but if you want to host an Anarchist, Communist, or hell, even Environmentalist website anonymously, this is a good way to do it. Visiting eepsites is anonymous and won't get you placed on a FBI watch-list simply because you like to read Marx, Goldman, or whatever thinker you may follow.

Note: The Tin Hat is available as an eepsite as well, over at secure.thetinhat.i2p!

4. Torrents

This may be the kicker for many of yee pirates out there, as I2P has the Postman Tracker and I2PSnark. The tracker is essentially the Pirate Bay, and I2PSnark is essentially uTorrent. This is where I2P sets itself apart from Tor, in that it has absolutely no issue with users torrenting. In fact, torrenting just provides more cover-traffic, improving overall anonymity. On I2P torrenting is secure and anonymous, and I personally trust it far more than any VPN provider, as it has privacy by design rather than privacy by policy.

The torrents available on the tracker are great, and reflect the user-base of I2P. No, there isn't much (if any) child pornography as some might claim about darknets. Rather, there are plenty of books, including huge collections on sci-fi and programming. There are also copies of the Pirate Bay, backups of leaked government documents, and books that have been banned in some countries. There are also movies, music, and of course as always, porn. But comparing something like the Pirate Bay with the I2P Postman Tracker shows you the overall attitude of many I2P users; that is to say that they value transparency, freedom of speech, copy-left, and the power of technology within society.

The drawback of I2P is speed, with an average of about 30KBps, which is painfully slow compared to the 1-2MB/s that most torrenting sites offer. But consider this, the longer that you spend waiting to download a torrent over I2P rather than the Pirate Bay, the less time you'll spend getting sued. It's a trade-off. Many people start a torrent on I2P and let it run overnight. Usually by morning it is finished, without worry of the MPAA or RIAA coming after you for downloading content produced sixty years ago.

Setup

Setting up I2P is easy if you've ever forwarded a port before. If not, don't worry, I'll explain how. It may seem confusing at times, but just stick with it, I promise it's not that bad.

The first step is to download the I2P installler. If you're running Windows then the graphical installer should be simple enough. If you're on a Debian based operating system then just add the repositories that are listed here, and follow the documentation on that page accordingly.

I’d also highly recommend using The Tor Browser for browsing I2P (read this for an expanded explanation of using Tor Browser for I2P, including a couple of security considerations). To set this up, the first step is to download the Tor Browser, extract it, and run it (no installation is necessary).

Next, the way that we will configure the browser to work with I2P is through the use of an add-on called FoxyProxy. Using the Tor Browser, navigate to the FoxyProxy page on Mozilla’s website and install the add-on. After doing so, you will be prompted to restart the browser to complete the installation.

After restarting, download this configuration file for FoxyProxy. I’ve mirrored it here to make it accessible, but originally it was the product of KillYourTV. With that downloaded, press CTRL+SHIFT+A, and open the preferences for FoxyProxy. Go to File > Import Settings, on the Preferences panel and import the configuration file that you just downloaded.

This may cause the browser to crash, but after re-opening it FoxyProxy will have a complete rule-set for how it handles traffic such that any requests to either the clearnet (techno-jargon for the regular internet) or to Tor hidden services will travel through the Tor network, but any requests to a domain ending in .i2p will travel through the I2P network. In other words, you are ready to browse I2P.

With the Tor Browser open and configured, the next step is to start I2P. If you're on Windows then it is as simple as clicking the icon in the start-menu. If you're on Linux, then just cd into the i2p folder and type into your terminal i2prouter start. This may automatically launch your default browser. If it does, click the 'Configure Bandwidth' button on the I2P console. Then go to the 'Service' tab, and click 'Do Not View Console On Startup'.

Now, in the Tor Browser navigate to http://127.0.0.1:7657/

Download Torrent Movies Pirate Bay

You may want to set this as a bookmark to make things easier. Next, check the left-hand sidebar. If it says 'Network: OK', you're ready to start using I2P. If it says otherwise, then click on it. This will bring you to a page describing the problems it may be having (note that it takes several minutes to connect to the network. Wait five minutes before worrying).

Can You Download Torrent Movies With I2p Windows

Troubleshooting

Blocked ports are usually the problem when connecting to I2P. To fix this, scroll up on that same page that describes the network error and check which port is entered into the 'UDP Configuration' box. For the sake of argument, let's say that it is 1793. Copy that number down and then find out your computer's internal IP address.

To do this on a Windows machine, open the start menu, type 'cmd' into the search bar, and then open up a command prompt. Type into the command prompt 'ipconfig /all'. This will list off a huge confusing display of numbers, but just look for a string of numbers that starts with '192'. For example, it may say '192.168.1.127'. Copy this number down. If you're on Linux, then just type 'ifconfig' into the terminal, look for the same string of numbers, and copy them down.

With the IP address in hand, type into your URL bar: '192.168.1.1'. This should bring you to your home router's configuration page. Every router's menu is a bit different, but just look for menus that are worded similarly to the way that I word them. Look for a tab that says 'port forwarding'. It may be buried within a few menus, but all routers should have this option. Once you find the port forwarding page, you need to forward the port that I2P needs to run. Under 'External Port', enter the first number that you copied down, in our case it is 1793. Do the same under 'Internal Port'. Then, under 'To IP Address', type in the internal IP address that you just looked up in the command line, in our case 192.168.1.127. Make sure to Enable it, and then click to save the settings.

If all went well, I2P should now be functioning. If you're still having issues, definitely check out I2P's FAQ for some answers. There are some more guides inside the I2P network itself for setting up services such as IRCs, I2PSnark, and I2P-Bote. Definitely play around a bit, and explore this 'evil dangerous darknet' that the media warns about, because it's actually pretty fun.

Another item that I want to note is that NO anonymizing service, whether it be I2P or Tor, will protect you if you are an idiot. If you post your real email, your real IP address, or any personal information (even the weather can reveal you!), then you may no longer be anonymous. So be smart. Read this short guide on how to safely use I2P.

Lastly, if you try out I2P and end up enjoying it and want to contribute more, try setting up a dedicated I2P relay. I give a step-by-step explanation of how to do this here.

Can You Download Torrent Movies With I2p Free

Want to upgrade your online privacy? I use NordVPN to encrypt my traffic and route it across the globe, and Spideroak for rock solid encrypted cloud storage!