this post was submitted on 07 Oct 2025
635 points (98.8% liked)

Mildly Interesting

23154 readers
316 users here now

This is for strictly mildly interesting material. If it's too interesting, it doesn't belong. If it's not interesting, it doesn't belong.

This is obviously an objective criteria, so the mods are always right. Or maybe mildly right? Ahh.. what do we know?

Just post some stuff and don't spam.

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] comador@lemmy.world 18 points 1 week ago (4 children)

Policing this crap isn't trivial and not worth the effort.

We just gave up and block 100% of all P2P traffic on both our university wireless and student wired networks.

[–] Godort@lemmy.ca 10 points 1 week ago

In our corporate network, we just detect for common BT applications on the endpoint and alert on that instead.

[–] fxdave@lemmy.ml 5 points 1 week ago (1 children)

What do you mean by blocking "100% of all P2P traffic"?

[–] comador@lemmy.world 6 points 1 week ago* (last edited 1 week ago) (1 children)

100% of all P2P protocols, literally are blocked by our University F5 BigIP by rule.

All of them (including certain Lemmy features).

https://en.m.wikipedia.org/wiki/List_of_P2P_protocols

When your IT has a small budget, you do what you need to do in order to mitigate the actions of the few.

[–] fxdave@lemmy.ml 2 points 1 week ago* (last edited 1 week ago) (1 children)

Sorry I still don't understand. Did you just block typical ports?

[–] comador@lemmy.world 2 points 1 week ago* (last edited 1 week ago)

No, there's no direct port blocking involved because P2P can work on all ports.

As such, the F5 BigIP identifies the packets themselves with the p2p protocol in them and blocks the packets themselves that are identified as P2P.

This way, the only torrent traffic that may get through is the kind running inside a VPN. Even then though, we can identify encrypted torrents by other means (Deep Flow Inspection, trace the VPN traffic or directly monitor the student machines that are owned by the university).

[–] bjorney@lemmy.ca 5 points 1 week ago* (last edited 1 week ago)

My university just blacklisted the questionable trackers' DNS, not the actual data traffic

So basically I would tether to my cell phone, wait for it to fetch a list of peers from the tracker, and then switch back to the uni wifi to complete the download

[–] balsoft@lemmy.ml 4 points 1 week ago (1 children)

Why would you care? Is it a legal issue of some sort?

[–] bobs_monkey@lemmy.zip 13 points 1 week ago (2 children)

Likely is. When a dorm resident does the torrenting, the university would be receiving those naughty letters.

[–] Lost_My_Mind@lemmy.world 2 points 1 week ago

Oh, those naughty letters! There's a reason Seaseme Street is never brought to you by the letter J or Q. Such naughty letters.

[–] balsoft@lemmy.ml 1 points 1 week ago (1 children)

Sorry, I've never lived in a country which bootlicked the copyright owners so much. I've read up on it and wow it sounds kinda insane, someone spies on your traffic and sends you legal threats for pirating stuff.

[–] bobs_monkey@lemmy.zip 1 points 1 week ago (1 children)

Eh yes and no. Usually a representative of the rightsholder will join the swarm of a torrent, note all the IP addresses, and send their love letters to every ISP on that list. From there, the ISPs will forward the letters and may take action depending on jurisdiction and local law, which usually amounts to soft threats or suspending your account after multiple interactions. It isn't that the ISPs are spying on your traffic (at least in this instance), they just don't want to get caught up in "enabling piracy" or whatever nonsense. Hence why VPNs are a thing.

[–] balsoft@lemmy.ml 1 points 1 week ago

I'm not saying it's the ISPs spying on you, it's the copyright owners; and the ISPs bend over to them (because the legal system forces them to).