
There is no anonymity and everything happens in the clear. Anyone who wants to monitor who is downloading or uploading a given file can query public peer exchanges for a list of IP addresses that have expressed interest in it. The DHT serves a similar role, but instead of using a server the same information is jointly maintained by the participating P2P clients.


A tracking server is a web server that keeps track of which IP addresses that offering a given file (seeding) and who wants to download the said file. The devices discover each other using either a central tracking server or through the Distributed Hash Table ( DHT) collectively called peer exchanges. In traditional peer-to-peer ( P2P) file-sharing, two devices connect directly to each other to exchange data. ‘Using it wrong,’ unfortunately, includes using some of the program’s features at all and using others with the default configuration! I recommend that you take the time to read this article in its entirety before you consider using the software. Tribler is a complicated piece of software, and it won’t protect your anonymity if you use it wrong. Tribler features solid core technology, but the project’s mixed goals and priorities don’t live up to its user expectations of privacy. In this article, I’ll discuss how Tribler works, which parts of it are anonymized and which broadcast what you’re doing in the clear. I’ve followed the development of Tribler closely over the last two years.

This system can help provide more anonymity and obscure what you’re downloading and from where from prying eyes.

Tribler encrypts your connections in layers, so that each relay proxy only knows the IP address of the next and previous hop in the routing chain. Onion routing, best known from the Tor Browser project, is a network routing scheme that relays connections via multiple proxies. It adds something unique to the BitTorrent peer-to-peer protocol: onion routing. Tribler is a free and open-source file-sharing app for Linux, MacOS, and Windows.
