Did Your ISP Block ThePirateBay?

Just out of curiosity, there have been big talks about it being blocked by all ISP. Does it (still) work for you?

Obviously I mean direct connection without VPN or similar

Poll Options

  • 320
    Yes
  • 131
    Ne
  • 61
    Never tried

Related Stores

thepiratebay.se
thepiratebay.se

Comments

    • +4

      1.1.1.1

      • +1

        1.1.1.1

        or

        1.0.0.1

        • Didn't work for me on TPG nor 8.8.8.8

          Worked when I was on ADSL2+, but once switched over to NBN FTTN with VOIP, even if I changed it on my computer setup, IPleak.net still reports TPG DNS.

          Found that supplied Huawei HG659 locks the DNS and this can't be changed unless you forgo VOIP and go with a different modem/router.

        • 9.9.9.9

        • @x d:

          Does it work if you set it manually on your computer as opposed to the routers DNS?

          That's quite worrying, they'd be actively taking any DNS traffic and routing them back through their own servers.

        • @knk: There is no way to set DNS on the router. Manually setting on the computer used to work when I was on ADSL2+, even if I didn't bother to change the DNS setting on the ADSL modem/router. Now no more.

          Unfortunately if you want bundled NBN and home phone, you NEED to use the modem that they sent you. No way around it, unless you give away the home phone VOIP option.

        • @x d: Does anyone still use a "home phone"? I unplugged mine about 10 years ago as I only ever got marketing calls on it - my friends call me on my mobile.

        • @x d:

          I've got the 659 from TPG and you can definitely change the DNS on the router. You just need to login as root instead of the default admin account.

          The default password for root is: uh!7+a3ng

        • @x d:

          Just manually set your DNS on your PC. You can leave the IP to auto-assign but set your DNS to 8.8.8.8 and 8.8.4.4 (Google) - problem solved.

        • @iDroid: we rarely do use it but still need a fax line for convenience. Prefer to also use it when we call companies and are put on hold for prolonged periods. Prior to this we also needed a phone line for back to base alarm, which now needs to be updated. So yes home phone is still useful at times.

        • @kks: I came across that option on forums as well when I ran into this issue. I remembered trying it but I think TPG updated the firmware and that no longer worked. Can try again but have you succeeded?

        • @NuclearWessels: That's what I did. However, the TPG provided modem overrides it :-(

    • 8.8.1.1

    • +1

      8.8.8.8 is so last week.

      We're all 1.1.1.1 now, where you been?

      • +1

        getting old and left behind by the looks of it

  • Not yet but piracy is bad… mmmmmkay?

    It causes pi..pi..piracy, and and, te..terrorists and such… mmmkay?

    Long live Dread Pirate Roberts

  • TPG Blocked it…. they legally have to.

  • I didn't think anyone used TPB anymore to be honest, I assume half the crap on their has viruses so don't bother.

    I haven't been there since they originally announced it, I ditched it years ago.
    That and I have other options for content ie: streaming services so I have less need to find content elsewhere these days.

    • +1

      I'd be leaning towards > 90% of all pirated software regardless of source is going to be compromised in some way (virus, keyloggers, crypto miners, spam bots, etc).

      People do not spend their free time to crack and release other peoples software for kicks and giggles - they do it because they get something out of it. Working out what they're getting out of it is the hard bit. But I'd never ever install pirated software anywhere on my network, it's just not worth the risk.

      • +1

        Downloaded pirate stuff before. No malware noticeable and my router didn't see any connections when I open games.

        In fact I found pirated games to be safer due to no malware (sony root) and spyware (steam, ubisoft, origin).

        Mostly I pirate because of drm though if my peers want me to join. If I bought a game, its mine even if the company servers goes down. If they're selling game leases, then say so.

        Edit: If you want to pirate stuff safely, do research and analysis of community around pirated stuff. For example, Pirate bay had a reputation system where people can point out issues and tips. There are communities that talk about downloads. If you download the first thing you see, you take that risk.

        • +2

          Each to their own, but

          No malware noticeable and my router didn't see any connections when I open games

          Is hardly any reassurance.

          The actors behind pirate releases are not just script kiddies, they know how to hide any ill activity, it's what they do and they work VERY hard at hiding what ever it is they're up to.

          For example, perhaps the software does nothing until you go to log into your bank account. Maybe it only sends out data during a machine shutdown or initial startup, perhaps is waits until it's been inactive for a few hours, maybe it sends a bunch of data only one 3rd day of every second month between the hours of 2 - 3am. Not real examples, just giving an idea of what may be going on.

          I think it'd be naive to think any pirate software is free of unwanted "features".

          I totally agree with you regarding the rationale behind using pirated software (DRM, etc).

          I'm only saying that if you trust pirate software does not contain some form of "features" added by those providing the software, then I feel that is naive.

          I'm not new to this, I've been around since the days of Fravia - software reversing etc was once something of a challenge that was fun. Today it's a commercial enterprise and not a "love fest of free software for all", they do it to make money.

        • +1

          @iDroid:

          iDroid, you may well be correct. I don't know the ins and outs of the game and software cracking scene in 2018.

          But surely your level of paranoia should also extend to 'legitimate' software? If (your now-so-well-organised) 14-year old Latvian crackers are capable of inserting such amazingly insidious malware as you suggest, then surely the 'professional' established software houses are even more so? With even greater resources and capabilities. And more incentive to do so.

          I think there are limits to which 'normal' people are prepared to go in order to protect themselves online. Those limits may include running an antivirus/antimalware program, and for advanced users, perhaps changing their DNS. But for most of us, that's probably it. We take our chances with cracks, keygens, etc.

          Do you have actual evidence of your 'machine shutdown bank account stealing' malware? Not just theoretical, but actual? And not just an isolated incident, but thousands, millions? (BTW, Aust Consumer Law and Aust banking codes of practice largely protect us from malicious theft of our loot…)

          Surely the most destructive and dangerous malware of recent years has been the spate of ransomware infections? And these have nearly all been spread by the simplest and least complex method: through email attachments. Their success (?) has not relied on attacking a tiny community of probably tech savvy people (those engaged in piracy using keygens, cracks, etc), but rather a huge general population (those who use email), and have limited tech knowledge, such that they blithely open unknown attachments.

          I know what you are saying. And, as I said, you may even be right. But most of us simply can't be bothered donning the tin foil hat. The risk/reward regarding some free pirated software vs the small chance of something bad happening is worth our while.

        • +1

          @Roman Sandstorm:

          But surely your level of paranoia should also extend to 'legitimate' software? If (your now-so-well-organised) 14-year old Latvian crackers are capable of inserting such amazingly insidious malware as you suggest, then surely the 'professional' established software houses are even more so? With even greater resources and capabilities. And more incentive to do so.

          Not really, legitimate businesses are in the business of selling their product, compromising this for nefarious reasons is counter to their core business (ie, doesn't really make a lot of sense). Businesses are also accountable and liable for such actions. The operators are known and can be prosecuted for any ill actions.

          In short, I have a lot more trust in legitimate businesses. Sure they likely gather some analytics and phone home etc, and I'm not that fussed about that (ie, they are unlikely going to attempt to extort me or steal from me).

          I think a healthy level of paranoia is warranted when dealing with pirated software. Less so with legitimate software. Remember the age old adage "if it's too good to be true" squarely fits here.

          I think there are limits to which 'normal' people are prepared to go in order to protect themselves online. Those limits may include running an antivirus/antimalware program, and for advanced users, perhaps changing their DNS. But for most of us, that's probably it. We take our chances with cracks, keygens, etc.

          Cracks and keygens are the worst of all IMO. Take any keygen from 5 years ago (especially the ones you believed were clean) and run it through a modern virus scanner - you may be surprised!

          Virus scanners are always a few steps behind the virus writers.

          Do you have actual evidence of your 'machine shutdown bank account stealing' malware? Not just theoretical, but actual? And not just an isolated incident, but thousands, millions? (BTW, Aust Consumer Law and Aust banking codes of practice largely protect us from malicious theft of our loot…)

          Those were "not real examples, just giving an idea of what may be going on." These were abstract ideas of why you may not immediately see spurious packets blasting out of your network. As a virus writer, that would be a pretty blatant and easily detectable action (ie, no one does that now). Virus writers have been doing this for years, they are MUCH better than you and I at doing thing without being detected.

          Banks don't advertise their users' impact from such compromises. Yes we are mostly protected (if you can prove it wasn't you - which can be very hard if it appeared you logged in and transferred your money) it could become a case of proving it. I don't know the ins-and-outs of how the banking system handles such breaches but I do understand software.

          These silly contrived examples I came up with are overly simplistic and likely not live approaches (though there could well be some). I expect they are far more complex and use mechanisms we've never even considered.

          I know what you are saying. And, as I said, you may even be right. But most of us simply can't be bothered donning the tin foil hat. The risk/reward regarding some free pirated software vs the small chance of something bad happening is worth our while.

          If you're young with little to lose, then your risk proposition may hold. But if you think it's a tin foil hat situation to never install pirated software on a machine that has raw network access to machines on my network that do internet banking to accounts that hold my life savings, then IMO your assessment of the risk vs reward is skewed.

          Perhaps I am paranoid, but only real analysis would shed light on that: https://security.stackexchange.com/questions/129762/is-malwa…

          But a couple of paragraphs:

          Bruce Hughes […] found that about 45% out of 4,778 files he downloaded with Kazaa contained malicious code

          and

          Our results from over a month of data show that 68% of all downloadable responses in Limewire containing archives and executables contain malware. […] [I]n Limewire, the top three most prevalent malware account for 99% of all the malicious responses.

          and

          11% of the key generators and crack tools downloaded from Web sites and 59% of the key generators and crack tools downloaded from peer-to-peer networks contained either malicious or potentially unwanted software.

          This is what was detected, there's likely more undetected too!

          There are links to papers etc in the source link.

          I'm not saying "you'll die if you use a keygen", the point is more "know your enemy, know where they are, know their objective" and act accordingly.

          Also note, that I'm not saying just be worried about your bank account. Crypto miners, spam bots, bot nets, etc all cost you real money too (or your parents if you're living with your parents). There's a lot of different ways to compromise and take advantage of a compromised machine.

        • +3

          @iDroid:

          Thanks for your detailed and well-reasoned response. So often on these forums replies are argumentative, abusive, etc.

          The Stachexchange link is interesting, but not wholly supportive of your viewpoint. LOL… Most of the comments were skeptical. And the only real stats were from Kazaa and Limewire. These are so old I thought they died out during Prohibition?

          Scanning old keygens is likely to produce positive hits. Probably mostly due to alteration of executables and injecting code. This is a testament to modern AV scanners. :-) And the sloppy programming of my (theoretical) 14 year-old Latvian crackers.

          I know there are nasty things out there. But I still contend that most of us (like the 'Jim' example) don't really encounter them with casual piracy.

          What do we encounter? Well, in my 20+ years of IT admin, the very worst thing I have seen is ransomware. Things like Cryptolocker. Not spread through keygens, cracks, etc. Spread through everyday email use, user inattention, and clever disguise of attachments.

          The next most common annoyance/issue? Extensions, toolbars, startup programs, etc. And nearly all of these from 'legitimate' programs from legitimate companies, often paid for with real $$$.

          I do not deny most of your points but, to be honest, from a day-to-day perspective, I put them in the same category as RFID-proof wallets. Yes, in theory it may be possible to 'steal' information from someone's cards in their wallet, by using a massive complex RF scanning process. But in reality (AFAIK) there has never been a reported successful hack outside a lab environment. But there are lots of paranoid people prepared to purchase special (expensive) protected wallets.

          As was mentioned at the link, and maybe even here, anti-piracy advocates often have a credibility issue; a conflict of interest. Content industry (software, movie, etc) representatives spread FUD through outright lies (eg, that simply playing a video file can get your computer infected, etc). Security industry people want to sell you their product or their services (hence highlighting the potential or theoretical dangers of non-legitimate stuff). Real objectivity is difficult to find.

          My own, admittedly subjective and anecdotal experience leads me (and possibly this is totally biased and utterly erroneous - I admit that, and would be prepared to modify my view with some good solid evidence) to the view that completely legal and legitimate software, email, bundled players, etc, is a greater threat, danger and annoyance, than the more ephemerous potentialities of hackerdom.

          Maybe my risk vs reward view is also skewed by the fact that my accessible life savings online would probably only reap a malfeasant the equivalent of a few cups of coffee. :-(

        • +2

          It's not uncommon for pirated games to run better than legit copies…

        • +2

          @Roman Sandstorm: I totally agree with everything you said, great reply.

          For myself, the risk is low but the consequences could be high so I act somewhat more paranoid than most.

          Healthy discussion regardless.

        • +1

          @iDroid:

          Healthy discussion regardless.

          Indeed and such a change.

  • +2

    Usenet is better anyway.

    • +1

      Doesn't it get DMCAd like hell making retention of data shithouse?

      • Depends on who you use really. I have to admit there have been instances where incomplete downloads have wasted so many GBs from my monthly data allowance. Especially on my shitty 3MBit connection. :(

    • +4

      The first rule of usenet

  • +2
  • +4

    Only the major ISP's: Telstra, Optus, TPG/iinet, Dodo etc were required to block access by the court order. Smaller ISP's were not covered by the order but may voluntarily decide to block access. I would say that is your explanation.

    • I'm currently with belong (a telstra subsidiary) and thepiratebay dot org opens fine. No VPN, with default DNS and only chrome extension is adblock.

  • +1

    I just google piratebay proxy sites and use one of those.

  • People still use public torrent sites lol

    Torrentday
    Torrentleech is all i use and never had a problem

    • -1

      If people don't know any better, that's all they're going to use, especially those who are ignorant.

      I was once, lol, but followed the right peeps, got in a few.

    • +1

      I use TL but I'm not too sure how it compares to other places like AR.
      Don't think I have the time to maintain both ratios anyways.

      Also have never had a problem with TL

      • Hard to keep a ratio at TL on newer content, AR is good; bounty on requests

  • being blocked by all ISP

    The correct term should be redirected. If it's really blocked then there will be no way around it.

  • -3

    Yeah who bloody hell use public torrent with shitty seeds/leech ratio these days?Donate to Torrentday and get a life time membership. Most major rippers exclusively release theirs stuff there first so all the new stuffs are there first.

    • Actually no, all of their uploads will be sourced from other private trackers or from the 'scene'. Torrentday has very little if any internal release groups and definitely none of the big names.

      • I'm a member there for more than 5 years. I think I know if they have their own groups or not.

        • What are the groups?

        • @Cheaplikethebird:

          Just screenshot this below a few minutes earlier. Go to the "scene" or other trackers you think might be faster than Torrentday and get back to me with the timestamp of those files listed in the picture.

          https://ibb.co/b9MqRc

        • +3

          @Wolfofwallstreet: Legi0n is an internal group from BeyondHD and W4F/GECKOS are both scene release groups. So Legi0n releases will have been uploaded to BeyondHD first and one of that sites members will have uploaded it to Torrentday. W4F/GECKOS releases will have been uploaded to topsites first ( https://en.wikipedia.org/wiki/Topsite_(warez) ).

          The only TorrentDay internal in that list are the couple of 720p encodes of old movies by x0r.

        • +2

          @Cheaplikethebird:
          I'm pretty sure Legi0n are from HD4Free and not BeyondHD but the rest you are correct. Having said that, they are very fast to post up on Torrentday.

  • I just change the DNS to 8.8.8.8 and alternate DNS to 8.8.4.4 which is Google's DNS.

    Or you could look into using Usenet but that usually involves monthly costs (I pay around $5 USD a month to subscribe to a usenet provider).

    … Or if you're lucky and know someone, get a private tracker invite.

  • Blocked by AAPT here

  • +2

    Set your DNS to 1.1.1.1 for uncensored internet
    https://torguard.net/ as a DCMA letter trashcan

    If you're too cheap for a vpn, don't know how to configure DNS, and want to live life on the edge:
    http://opera.com
    Use the built-in vpn

    • What if I just use Firefox with no vpn no dns no nothing naked..

      • Well first of all, +1 for supporting the only major browser not backed by a corporation.

        It really depends on what you're doing. I'm not sure if you're aware, but since 2016, our ISPs are retaining our internet metadata for 2 years, on potentially insecure servers, and a whole lot of organizations have access to it, including the RSPCA.

        http://theconversation.com/the-new-data-retention-law-seriou…

        A lot of us consider this to be an invasion of our privacy. If I'm searching for a medical condition for example, and visiting related websites, I wouldn't want this metadata becoming public next time one of your stupid telcos gets hacked. That's just one example, having this data retained is a major breach of our privacy.

        This is why I use a VPN from my router. Now, ISPs are only storing the fact that I connected to a VPN.

        This thread talks about thepiratebay, and presumably downloading "linux isos" illegally. If you're going to do this, you'll want to be behind a VPN, so that rights holders can't get your IP address, and then litigate for exaggerated damages, (we're talking about life-changing amounts of money here).

        http://www.abc.net.au/news/2016-02-12/dallas-buyers-club-cas…

        And there's also the issue of censorship. Apparently our ISPs are blocking thepiratebay, and there's scope for them to block other sites. If you've ever been to China, you'll know why this is a terrible thing (not just that bing.cn sucks balls).
        Since our censorship implementation is pretty crude, you can work around it by simply changing your DNS servers to 1.1.1.1 (or 8.8.8.8 if you trust google, who I personally would trust more than our stupid ISPs)

        https://mic.com/articles/85987/turkish-protesters-are-spray-…

        And remember, even our AFP have said they can use the retained metadata to peruse pirates:
        https://www.gizmodo.com.au/2014/10/australian-federal-police…

        By using VPNs, we can stave off oppression a little longer, and even if your use-case is as simple as mine (not wanting my metadata becoming public when a rouge employee in any of the many organizations with access to it sells out, or when some overpaid public servant forgets to patch a router), you're also helping people who really need protection, by creating more encrypted traffic.

        A VPN is not a perfect solution to any of this. There are risks such as:
        -> Technical risks, see ipleak.net
        -> Trust issues (your VPN provider and the government of the country in which they're registered can see all your traffic
        -> If you login to a few websites, they know which VPN endpoint you're accessing from, and could narrow down a list of people using that IP address at the time.
        etc

  • Blocked by Telstra for me.

  • Change DNS, and you never know they blocked it in the first place.

  • I am with Mate Communicate and TPB is not blocked

  • What private torrent site do people recommend? I used to use demonoid but since they closed have used piratebay. Ideally a torrent site where I can donate and receive upload credit…

  • iinet business plan and yes they do.

    PIA VPN running on my router - Problem solved.

    • except for the fact that PIA is a Pain In the Ass when trying to torrent using the standard OpenVPN client.

      • Not really an issue if it's running on my router. Never had an issue with OpenVPN before setting it up on the router either.

        • Tried on 2 routers, a server and an raspberry pi 3. Everyone on their forum has the issue too.
          Switching to torguard fixed it immediately.

        • @idonotknowwhy:

          That's odd, what routers out of curiosity?

          Prior to setting it up on the router (Mikrotik, PPtP though I was lazy), I had it running under OpenVPN on Debian Linux on my torrent server. Perhaps the Windows OpenVPN client is worse than the linux one, although I did use it quite a bit when I was overseas just not for torrenting.

        • @knk:

          what routers out of curiosity?

          I tried it on:

          WRT1900AC running LEDE
          Raspberry Pi 2 running raspbian
          Some asus router (forgot the brand)
          My i7 desktop running Linux Mint 17
          An HP MicroServer running CentOS7

          I tried all the workarounds on their forums, no luck. Ended up throttling to 500kb/s and max 8 peers in "transmission" to keep it stable.

          Perhaps the Windows OpenVPN client is worse than the linux one,

          Probably, but I don't run windows.

          P.S. I still like PIA (the company) for sponsoring freenode and linux mint, but I wish I'd never wasted those years using their VPN service.

        • @idonotknowwhy:

          That's quite surprising, considering I had 0 issues over the last few years. Ah well, sounds like they were the culprit so what can you do.

  • +1

    8.8.8.8

    &

    1.1.1.1

    These DNS numbers are your friends.

  • Seems like the main one is blocked but the one with "3" in it is working

  • Yep, along with alot of other similar sites.. Many ways around it tho, don't have to use a VPN.

  • +2

    I'm with Telstra and not blocked strangely. I'm thinking they're spying on me…

    tracert tpb.org
    Tracing route to tpb.org [104.x.x.x]
    over a maximum of 30 hops:

    1 <1 ms <1 ms <1 ms pfsense [10.0.0.1]
    2 * * * Request timed out.
    3 10 ms 18 ms 11 ms 58.160.249.2
    4 12 ms 11 ms 11 ms bundle-ether4.ken-edge902.sydney.telstra.net [203.50.12.106]
    5 10 ms 11 ms 18 ms bundle-ether14.ken-core10.sydney.telstra.net [203.50.11.96]
    6 13 ms 17 ms 24 ms bundle-ether1.pad-gw11.sydney.telstra.net [203.50.6.61]
    7 11 ms 22 ms 11 ms bundle-ether1.sydp-core04.sydney.reach.com [203.50.13.90]
    8 14 ms 17 ms 11 ms i-0-1-0-25.sydo-core03.bi.telstraglobal.net [202.84.223.18]
    9 57 ms 56 ms 59 ms i-4-0-0.pthp-core01.bi.telstraglobal.net [202.84.143.46]
    10 125 ms 106 ms 106 ms i-0-4-2-0.sgpl-core01.bx.telstraglobal.net [202.84.143.94]
    11 296 ms 296 ms 290 ms unknown.telstraglobal.net [202.84.224.153]
    12 106 ms 107 ms 104 ms ip-202-147-48-100.asianetcom.net [202.147.48.100]
    13 106 ms 107 ms 107 ms be3.gw3.sin3.10026.telstraglobal.net [61.14.157.167]
    14 359 ms 338 ms 346 ms CDF-0014.10026.telstraglobal.net [203.192.169.226]
    15 350 ms 312 ms 309 ms 104.x.x.x

    My Telstra DNS servers are 61.9.194.49 and 61.9.195.193 if anyone's curious

  • +1

    I thought TPB was blocked long time ago

  • +2

    Why would you use TPB without a VPN is probably a more valid question.

    • Why not if using google DNS?

        • Oh I thought you were talking about malware or spyware.

          Even after the whole ‘Dallas Buyers Club’ fiasco there still hasn’t been anyone in this country get into trouble for downloading pirated material.

          I mean for the paranoid sure, but the they should use a VPN at all times and not just for TPB.

        • @c0balt:

          Even after the whole ‘Dallas Buyers Club’ fiasco there still hasn’t been anyone in this country get into trouble for downloading pirated material.

          Exactly.

          A plaintiff in our civil courts here has to show actual loss. It may be possible in theory to demonstrate a loss by a large software or media content company, but the cost of chasing that $19.95 against an individual is prohibitive. From obtaining the IP and data records from the ISP (and remember, this is not a criminal situation, but just a company asking for private information from another company), to providing experts who can present and explain in court the technicalities of p2p, to the actual wigged barristers… Probably tens or hundreds of thousands of dollars to sue Johnny who 'stole' a Transformers movie. To recover the 'loss'.

          I mean for the paranoid sure, but the they should use a VPN at all times and not just for TPB.

          Yes. A reasonable basis to operate from is to assume that all of one's online activity is transparent and visible to all. Then you ask yourself what activities do you feel uncomfortable potentially being shared with others (hackers, companies, government, I dunno, aliens?). Then you have a choice: a) take remedial action in those cases, by using encryption, tor, whatever, b) don't use the freakin' insecure internet, or c) take your communications, connections, etc offline altogether.

          Most of us are just not that level of paranoid. Google, or MS, or Facebook, or whoever, give us nice free tools and toys, we agree to their terms and conditions of use, we probably don't peddle in illegal drugs or commit espionage or hire a hitman. We are extremely unlikely to be sued for downloading the latest episode of Vikings, so as long as we are aware of these factors I do not see a major issue.

        • @Roman Sandstorm:

          True only an idiot would write about illegal activity on any online service the last few years with all that’s been happening in the media, regardless of privacy laws or what a EULA says.

          Considering meltdown and spectre were recently discovered, I’m willing to bet that even having a VPN or other methods of hiding identity have never been effective in actually hiding activity when the authorities have you in their sites. Why bother masking it all when all that information can be pulled straight from memory addresses.

          It’s the same reason that encrypted chat services like Wickr are not actually effective. They might be encrypted end to end, but if either end can be read then it doesn’t matter at all that the actual message in transmission was encrypted.

          I’m fine with just using google DNS, any other measure seems as though it’s effort + money for no real gain.

          I have stopped pirating software though as the risk of spyware/malware is high and CD key resellers can be really cheap these days.

  • change to google dns then it wont be blocked anymore. GG government

  • Assumed this was public knowledge…

    1. Go to the Control Panel.
    2. Click Network and Internet > Network and Sharing Center > Change adapter settings
    3. Right click > Properties
      Right click the connection you wish to alter.
    4. Select the Networking tab.
    5. Select protocol version > Properties
      Select Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol Version 6 (TCP/IPv6) and then click Properties.
      More than likely IPv4, but if not change both
    6. Click Advanced and select the DNS tab.
    7. Select Use the following DNS server addresses.
    8. Change to alternative DNS
      IE Google listed below
    9. Press OK *2

    For IPv4: 8.8.8.8 and/or 8.8.4.4
    For IPv6: 2001:4860:4860::8888 and/or 2001:4860:4860::8844

    • Easiest way is change DNS on router rather than on individual PC.

      • That would be the most convenient way for all devices to use it, but not the easiest way for someone with little knowledge.

  • If this is for TV shows or movies, there are heaps of sites that stream these. No need to download anything unless you want it in 4k. Honestly I can't be bothered so I just stream the shows

    • That really doesn't solve it when you can't find decent streams of movies.

      Streams I find run better for TV shows only

      • I'm using a website that's pretty good since 2 years

        • Would you care to pm me.
          Thnx

  • +1

    Nice try Mr FBI

  • Works perfectly fine for me, thepiratebay.org

  • -1

    πP*R#O£T@O!N&V+P?N✓

    ;)

  • I think the goverment require them to block those website.
    However I think if you have Encrypt DNS running, the block doesn't work

  • Yes and no. The connection I used was blocked, but the 100's of proxies weren't.

    So I can connect to thepiratebay.se, but not whatever extension I did before

  • Just use a vpn???

  • Can't you use Opera and who still uses TPB?

  • It's blocked for me if I use my ISP's DNS…
    Which I don't

  • They tried hahaha

    THEY TRIED

  • google pirate bay proxy

  • Optus blocked it.

    However, a quick Google search for 'pirate bay proxy' would yeld results (some proxies are no good), just find one that works.
    I don't use 'paid' or 'invite' or 'ratio' torrent sites, waste of time for me.

    I have used TPB for years and will continue to do so.
    No need to change DNS etc..

    I do use a VPN (private internet access with yearly membership), but most times, I have it off.

    blocking it was a complete and total utter waste of resources.
    They need a new IT team to let them know it is not possible to block ANYTHING online.
    Same with China, no Google, but yet, everyone has access to it.

  • Are there really still people who are using bittorrent without a vpn?

  • +1

    Wait the poll question isnt clear …

    Title asks “did isp block…?”
    Description asks “does it still work for you?…”

  • Y'argh they did

Login or Join to leave a comment