- cross-posted to:
- privacyguides@lemmy.one
- cross-posted to:
- privacyguides@lemmy.one
Mullvad will removed port forwarding from their app.
damn i wanted to start using that
What is (or rather was) it used for?
If you have a service you want reachable you need to port forward on a shared service like this.
So it’s necessary for reach-ability for torrent clients, web-hosting, game hosting, any kind of hosting.
But I don’t understand. I have always torrented using Mullvad without Port Forwarding and it always worked. How so?
There’s a nice post about it on the superuser forum here (along with more in-depth posts that you can easily find by searching).
PF = Port Forwarding
w/ = With
wo/ = WithoutThe TL;DR is that at least one person must have PF enabled in whatever operation you’re performing. So if you’re downloading wo/ PF enabled, then you can only download from seeders w/ PF enabled. If you’re seeding wo/ PF enabled, you can only seed to downloaders/peers w/ PF enabled.
Seeder w/ PF Seeder wo/ PF Downloader w/ PF Yes Yes Downloader wo/ PF Yes NO You’ll notice that if you have PF enabled, you’re guaranteed to have all options open, whereas if you don’t, you’re more limited (although in most cases are still able to perform P2P normally)
Makes sense. So everything would be slower. Damn, that’s a pity but I actually have never used it until now and sadly I cannot change this since I use Mullvad. I even seeded a lot without knowing this. What a pity tho, that would have been a game changer
This is interesting to me. Because you have other providers who also claim no-logs with port forwarding who don’t have this problem, ignore it, just deal with it, or something else is going on.
Maybe the pedophiles and malware hosters for some reason just really bought into Mullvad’s ad copy and all hopped on board at levels no competitor has seen (I have seen them mentioned at levels I haven’t seen since pirates were raving about PIA back before they were bought out). That or it suggests something about the level of cooperation that other providers who provide no-logs (claimed) and port-forwarding give to law enforcement at least on the level of hosting of CSAM and malware stuff. That or that their competitors are willing to invest personnel into shutting down accounts in a timely manner who engage in that kind of stuff so the bad actors ignore them. One could optimistically hope they work closely with law enforcement and turn on logging temporarily for such investigations only long enough to identify the perpetrator, grab their real external idea from state tables and pass it to law enforcement.
(Context: They clearly are shutting this down for two reasons, one is clearly stated in malware/malicious activities, the other is obfuscated but can really only be CSAM hosting and people on reddit in their sub were confirming that the Iknowwhatyoudownload website is flagging IPs associated with that service for hosting CSAM)
This does make it much less useful for the main use most have for VPNs though which is p2p bittorrent file-sharing so I expect that’s going to hurt though it should drop the amount of bandwidth they pay for significantly too and maybe just leave more profitable privacy seekers.
I truly hope that it was something about them and that other providers that I use don’t get inundated with these criminals and remove port forwarding entirely.
I think piracy also plays a role in it
does the community have any recommendations for a replacement provider?
seems this reddit post has an update for providers: https://old.reddit.com/r/VPNTorrents/comments/rikthc/list_of_recommended_vpns_2022/
If only people would realise how I2P is perfect tool for torrenting :)
Question: if port forwarding is removed, wouldn’t I2P connectivity be degraded in exactly the same way as using a torrent client? As in you can build outgoing tunnels to peers who do have a public ip/accessible port, but cannot receive incoming tunnels, same as in the table by @blank_dvth below? Making connections slower or impossible? Or is it better because of the multiple hops in a tunnel, such that two peers behind NAT can still reach each other as long as they can both find an intermediate relay node with a public ip?
I’m using AirVPN right now. They’re pretty good (albeit very old-school), support port forwarding, etc. Same price as Mullvad at 3 months and cheaper for any larger plans (+ they’re doing a sale right now.) Also tried IVPN - they’re OK but a little more expensive and has no port forwarding in the US.
I’ve been eyeing cryptostorm, uses wireguard, you can portforward, and you can do it all from a command line…
I think I’m going to ivpn, it seems pretty solid. Otherwise I’d go to airvpn
God damn it, Mullvad was so good aswell. Time to abandon ship :(
deleted by creator
Soulseek users are gonna hate me 😭