averageshade@lemm.ee to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 年前What is the best site to search for torrents?message-squaremessage-square41fedilinkarrow-up166arrow-down10
arrow-up166arrow-down1message-squareWhat is the best site to search for torrents?averageshade@lemm.ee to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 年前message-square41fedilink
minus-squareQuikxSpec@lemmy.worldlinkfedilinkEnglisharrow-up2·1 年前Thank you. Does this create any considerable vulnerabilities?
minus-squarejws_shadotak@lemmy.worldlinkfedilinkEnglisharrow-up1·1 年前Not typically but it can vary depending on which protocol and which provider you use. Best to check yourself using something like ipleak.net and see if there’s any identifying info on there while you’re connected.
minus-squareQuikxSpec@lemmy.worldlinkfedilinkEnglisharrow-up1·1 年前That’s great. I’ll do some more research on the hardware I have also
Thank you. Does this create any considerable vulnerabilities?
Not typically but it can vary depending on which protocol and which provider you use. Best to check yourself using something like ipleak.net and see if there’s any identifying info on there while you’re connected.
That’s great. I’ll do some more research on the hardware I have also