←back to thread

655 points k-ian | 1 comments | | HN request time: 0.259s | source
Show context
jauntywundrkind ◴[] No.44302762[source]
I actually ran a very-short-lived private use tracker briefly, for some exploration doing p2p watch partying. But it was a toy, never got serious enough to look deeper at how the tracker worked (was using the rust Aquatic tracker, which kindly added webtorrent support on request! https://github.com/greatest-ape/aquatic )

Does the tracker know what it's tracking? Is there any attempt to make the tracker unaware of what peer rendezvous it's doing?

My gut is that it seems some kind of hash/magnet that folks are asking to peers on. And that the magnet itself is sufficient, and doesn't have to include anything identifying (although I believe many magnet links included some human readable description). The tracker could likely try to download this hash from the peer itself, to get the torrent info, but wouldn't really know what the torrent is or what's in it without doing the download itself.

Does that check out? How much of the magnet link is key to rendezvous? Could a tracker ignore human friendly fields, block them at ingress, to shield it's eyes?

replies(2): >>44304630 #>>44304816 #
qingcharles ◴[] No.44304630[source]
The tracker knows what it is tracking. I used to run a TV show tracker. It would keep track of all the users upload/download ratios.
replies(1): >>44305718 #
1. aeyes ◴[] No.44305718[source]
The blog post is about a public tracker. What you describe is a private tracker which embeds a client identifier into the announce URL of the torrent.

On a public tracker the only way to identify a user is the IP address and that's not reliable.