Drealm Posted March 17, 2010 Report Share Posted March 17, 2010 I recently saw this in the list of my peers:[FAKE] uTorrent/1.8.2.0So, I searched the internet, and discovered that this is probably a "torrent poisoner".So, I searched the internet again for this term and curiously, nearly nobody can explain what is that and what they do exactly. The term have been said in this topic: http://forum.utorrent.com/viewtopic.php?pid=463890 by Moogly and Switeck, but nobody explained:What is a torrent poisoner?What they do exactly?For what purpose?Is it safe to seed them, or as soon as we see one we should stop seeding?Is this some kind of P2P police?So an answer would be VERY appreciated, because this time, Google let me down. Link to comment Share on other sites More sharing options...
Firon Posted March 17, 2010 Report Share Posted March 17, 2010 They try to seed bad data. That's what they do. Link to comment Share on other sites More sharing options...
Drealm Posted March 17, 2010 Author Report Share Posted March 17, 2010 this answer is interesting, but lacks a lot of explanations. More details would be very appreciated... Link to comment Share on other sites More sharing options...
moogly Posted March 17, 2010 Report Share Posted March 17, 2010 All fake clients are not necessarily torrent poisoner, they can be client spoofers.Real poisoners are run by firms mandated by rights owners to polluate the p2p networks.They track a popular torrent (like the last fashion movie) and with a modified client (coming from an open source client like Azureus), they catch leechers (honeypot strategy) and flood your client with bad data. Link to comment Share on other sites More sharing options...
Drealm Posted March 17, 2010 Author Report Share Posted March 17, 2010 Thanks a lot. But I still have interrogationsWhat is a client spoofer? (and what they do, why they exist, etc)What are the consequences of poisoners flooding my client with bad data? Can it give a corrupted file once downloaded by the client? Can it really stop p2p exchanges? Link to comment Share on other sites More sharing options...
Switeck Posted March 18, 2010 Report Share Posted March 18, 2010 Have you tried GOOGLE? Or searched this forum for examples and more information? Link to comment Share on other sites More sharing options...
Drealm Posted March 18, 2010 Author Report Share Posted March 18, 2010 Have you tried reading my initial post? Yes, I searched google, and yes, I searched here. It was all said in my initial post. Link to comment Share on other sites More sharing options...
Switeck Posted March 18, 2010 Report Share Posted March 18, 2010 Could've fooled me then with your questions, because it's been answered all before here. Link to comment Share on other sites More sharing options...
Ultima Posted March 19, 2010 Report Share Posted March 19, 2010 Client spoofers do exactly what you're observing. They are clients that pretend to be other clients.The only direct consequence of poisoning that bandwidth is wasted -- potentially a lot. The indirect consequence is that it can slow the entire swarm down by inundating it with useless data, which may also cause peers to become disinterested in the swarm. Link to comment Share on other sites More sharing options...
Drealm Posted March 19, 2010 Author Report Share Posted March 19, 2010 Thanks Ultima, very appreciated. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.