How to Use a VPN for Torrenting

We’ll walk you through exactly how to use a VPN to torrent large files.

By
&
Aliza Vigderman
Gabe TurnerChief Editor
Last Updated on Apr 2, 2021
By Aliza Vigderman & Gabe Turner on Apr 2, 2021

Your private information

My IP Address

IP: 34.236.191.104

Status: Unprotected

My IP Information

Internet provider: Amazon.com, Inc.

City: Ashburn

Region/ State: Virginia

Browser name:

Browser version:

Device brand:

Device type:

Latitude: 39.04663

Longitude: -77.49013

Postal code: 20149

These days, privacy is hard to come by, but VPNs are a great way to stay private online. When we’re using our Macs, either for sensitive journalistic research or for shopping online, we don’t want our internet service provider to know our every move. The good news is that setting up a VPN on Macs is easy, and we’ll tell you exactly how, starting…now!

AVG VPN on Mac
AVG VPN on Mac

How to Torrent with a VPN

Let’s begin with the tactical advice. Here’s a step-by-step guide to torrenting with a VPN.

  1. Pick out a VPN service. VPN stands for virtual private network, and it’s a type of software that creates an encrypted tunnel between your computer and a network. Using a VPN hides your internet activity from your internet service provider (ISP). We compiled the best VPNs for torrenting, so that’s a great place to start. If you want to do your own research, we recommend double-checking that the VPN service allows torrenting, as not all apps do. In terms of cost, VPNs cost anywhere from $2 to $15 per month, depending on the service, the contract length, and the number of connected devices. There are also several free VPNs for torrenting that we’ve reviewed and recommended.
  2. Check that your VPN is working. After you select a service, make sure that you check that your VPN is working and that your data is fully encrypted, end-to-end.
  3. Enable the kill switch. A “kill switch” shuts down all of your open apps and activity if your VPN stops working. This ensures that your activity isn’t exposed, even for a split second. A kill switch is a particularly useful tool for torrents, because people can leave their computers downloading files for hours at a time. If, during this period, your VPN connection drops out, your IP address could be exposed, and you could be identified.
  4. Visit a torrenting site. Visit a torrenting website and search for the content that you want.
  5. Download the file. Once you have found the content that you want, click on its magnet link or download its torrent file, and voila! You’ve officially torrented with a VPN.

Money-saver: Most VPN services offer a 30-day, money-back guarantee, so you can test out a service before fully committing to it.

Kaspersky VPN - Mac App On
Kaspersky VPN – Mac App On

Why Would I Use a VPN to Torrent?

Believe it or not, a lot of your internet browsing is fully visible to your ISP. These companies could collect your personal data and hand it over or sell it to third parties. These third parties could be marketing companies, or they could be the government. Therefore, it’s crucial to protect your data from anyone who is trying to collect it without getting your explicit consent, especially important if you plan on downloading and sharing torrent files.

What Is Torrenting?

“Torrenting” refers to file sharing through a decentralized, peer-to-peer (P2P) sharing network. P2P file sharing lets users exchange files without uploading them to a server. Typically, when you download something off the internet, you click a “download” button, and boom, the file appears on your computer. Torrenting works a bit differently. Rather than taking a whole file from a single server and downloading the entire file in one go, a “torrent” (sometimes also called a “tracker”) will break up the big file and divide it into little pieces called “packets.”

The packets are on a server (also called a “seeder”) in their entirety and are also shared throughout a network of computers. These are your “peers” or “leechers.” The torrent file keeps track of who has which packet and alternates where you’re downloading from. Each leecher acts as its own small server, reducing network load. However, as you are downloading, you’re also uploading, which can slow down your internet majorly.

What Is BitTorrent?

BitTorrent, sometimes abbreviated as BT, is software that moves files around the internet. The tool is a communication protocol for P2P-sharing that enables users to distribute data and electronic files over the internet in a decentralized manner. BitTorrent is one of the most common protocols for transferring large files, like digital video or audio files, with over one billion users worldwide.1 To send or receive files, you can use a BitTorrent client, which is a desktop program that implements the BitTorrent protocol. Popular clients include μTorrent, Xunlei Thunder, Transmission, qBittorrent, Vuze, Deluge, BitComet and Tixati. BitTorrent trackers provide a list of files available for transfer and allow you to find peer users who can transfer the files.

Streaming vs. Torrenting

Streaming and torrenting can seem similar in that they both involve a file being sent to a device. The big difference is that a streaming file is played as it becomes available, while a torrenting download is stored onto memory. Another main difference is that direct downloads are from a single source, while torrents are P2P. P2P sharing allows you to download content from a source as well as from other users. Streaming and torrenting are both ways to watch content, and we’ve compiled the best VPNs for streaming, as well.

How Does Torrenting Work?

Torrenting doesn’t depend on a centralized server for storing files. Instead, bits of data from individual large files are saved in participating users, or peers, to facilitate the file-sharing process. A P2P communication protocol like BitTorrent breaks the files into pieces and moves them from uploaders (seeders) to downloaders (leechers) via a torrent client. The torrent client is a separate program that reads all the information in the .torrent file and connects users to exchange data.

So, for example, if we wanted to send all our videos of our cats across our team at work (and there are a lot), instead of emailing bulky files back and forth, we could torrent the files through a torrent client and move them to our colleagues effortlessly. We get to share our footage quickly, and our co-workers’ computers aren’t bogged down with files of our cats. It’s a win-win.

How Does Peer-to-Peer File Sharing Work?

Peer-to-peer (P2P) file-sharing enables computers’ compatible P2P programs to join together and form networks. Then, users can share digital files directly with other computers on the newly created network.2 Virtually anyone can join a P2P network by installing particular software, so millions of computers can be connected at one time and share audio, video, images, and games.

Torrenting is a fast and easy way to share huge files. Furthermore, when we’re talking about huge files, we typically mean music, videos, and high-quality photos, aka the type of content that is most shareable. Another plus is that users can share content from other countries that they might not have access to through a streaming service.

Is Torrenting Illegal?

Torrenting itself is not illegal, as it’s really just another method of sharing large files. However, what files are being shared matters, and that’s where things get thorny. Torrenting can become illegal if a user uploads or downloads copyrighted material through a torrent client or website, per the Digital Millennium Copyright Act of 1988.3 If you get caught violating the copyright act, you can face fines ranging from $200 to $150,000 for each work infringed upon. Those who have led large-scale violations have even faced prison time.4

Why Hollywood Hates Torrenting

While torrenting copyrighted material is certainly illegal, it happens all the time. When users torrent music and movies, they are getting the content for free, without paying any of the creators. Since torrenting is so popular, illegal content downloads add up. It ends up costing studios, filmmakers, and artists, as royalties are not collected. We certainly don’t recommend torrenting copyrighted material because it’s illegal, but the trickle-down effect to the creative industry is another reason to steer clear.

Why Is Torrenting Dangerous?

Generally speaking, most torrents are relatively safe to download, as long as you know where they’re from. However, malware-ridden torrent files are widespread and are often linked to pirated copies of TV shows. Additionally, torrenting requires sharing a network with many (sometimes thousands) of users, and malware could be anywhere. In addition to being vigilant about file sharing, it’s also beneficial to invest in antivirus software.

Warning: Torrent-users need to watch out for executable (.exe) or batch files (.bat) as these are commonly associated with scripts that install malware into computers.

Speeds While Torrenting With a VPN

Unfortunately, VPNs will slow down your system, and so will torrenting. It’s important to minimize slowdowns, since no one wants to be totally bogged down while doing their work, online shopping, or even just scrolling mindlessly. A good way to increase VPN speeds is to choose a server that you’re physically close to. That’s why it is imperative to choose a VPN company that has a lot of servers, because the more servers a company offers, the higher the likelihood is that one will be near you.

Public Wi-Fi networks are great but can also cost you some speed, especially if there are multiple devices on the same network. If it’s possible, using a wired connection will increase connectivity. When it comes to VPN data consumption and cellular usage, you can choose a VPN protocol that uses the least amount of mobile data, like IKEv2 or IPSec, and avoid 256-bit Stealth OpenVPN. In some cases, VPNs can actually help your internet speeds. ISPs have been guilty of “bandwidth throttling,” or slowing down your connection if they notice that you’re downloading or streaming large files.5 VPNs make it impossible for your ISP to see your traffic, and without knowing what you’re doing, they can’t throttle your traffic.

Norton Speed Test on Mac With VPN
Norton Speed Test on Mac With VPN

Is uTorrent Safe?

Yes, uTorrent is, in and of itself, safe when used properly. No spyware or malware will come from installing the program if it comes from an official website. However, that doesn’t mean that it’s 100 percent safe. There are plenty of bad actors in the torrenting world who want to infect your computer, and you might get exposed to them via uTorrent. That’s why we recommend torrenting with caution, ideally only downloading files from credible users. It’s also crucial to keep an eye out for files ending in .exe or .bat, which are often affiliated with scripts that can plague your system with malware.

How a VPN Protects You

A VPN allows you to communicate over a public, unsecured, unencrypted network privately and safely by establishing secure, encrypted connections. In other words, it routes data coming from your computer through servers in other locations and scrambles it to make it unreadable to bad actors (like hackers) who may want to spy on your activity. Wireless connections, like the Wi-Fi network at your favorite coffee shop, are especially vulnerable.

A VPN encrypts, or scrambles, data so that a hacker can’t see what you’re doing online. The VPN forms a tunnel between your computer and the VPN server and hides important information like your IP address, browsing history, credit card information and downloads. The tunnel can’t be penetrated and the VPN connection is private. Further, you can use it on all of your devices, including your phone, laptop and tablet. VPNs also protect data, like your emails, downloads, login information and browsing history. A VPN alters your IP address, too, making it seem like you are using your computer elsewhere, and consequently, making it even harder to trace your activity back to you.

How to Choose a VPN for Safe Torrenting

Below are the features you want look for in a VPN for torrenting:

  • Security: You want a VPN with strong encryption protocols (AES-256 bit is the gold standard).
  • A kill switch: A kill switch will close out of all applications and browning activity in the unlikely event that your VPN fails.
  • Ability to torrent: Some VPN services block torrenting, so if you’re planning to use the VPN for those purposes, double-check that it’s possible.
  • A privacy policy with minimal logging: We generally don’t find it acceptable for a VPN company to log any of our web traffic, geolocation, or originating IP address. We have more flexibility for companies keeping track of information that’s necessary to uphold our accounts, like our names and payment information. Some of the biggest VPN providers have started to audit themselves independently to make sure their privacy policy is competitive.
  • Speed: There’s no point in choosing a VPN that throttles your speeds so much that going about your business takes forever. We test for a difference in ping (latency), download speeds, and upload speeds. When we review VPNs, we use the speed test from Ookla6, which measures speed in milliseconds for ping and and megabits per second for download and upload speed.
  • WebRTC and DNS leaks: To make sure our private IP address is hidden with the VPN, we use the WebRTC leak test7 to make sure the IP address shown is different with the VPN on and off. We do the same with domain name servers (DNS), or website URLs. We use the tool on DNSLeakTest.com8 to look for a change in an IP address with the VPN connected.
  • Customer service: Last but not least is choosing a provider with excellent customer support options. Most companies offer an FAQ database and email support line, but live chat features and phone lines are more helpful.
McAfee VPN - WebRTC Leak Test Windows
McAfee VPN – WebRTC Leak Test Windows

Worst VPNs for Torrenting

Not all VPNs allow torrenting, so it’s important to double-check a VPN services’ features if you’re planning to torrent. For example, Encrypt.me does not allow torrenting, while KeepSolid VPN only allows torrenting on a handful of servers (California One, Ontario, Romania, Luxembourg, and Paris).

In Summary

Torrenting is a simple and effective way of sharing videos, music, and images. Using a VPN will protect all your sharing activity by encrypting your connection, making it impossible for your ISP to see what you’re up to. While VPNs hide a users’ activity, we do not recommend using a VPN to torrent copyrighted materials. Doing so is illegal, and like all digital security, VPNs aren’t 100 percent airtight. However, if you plan on torrenting your latest TikTok outtakes, mixtapes, and old vacation pictures, it’s best to do so while using a VPN.

FAQs

Still not sure about how to use a VPN for torrenting? We answered the most common questions below.

  • Is torrenting safe with a VPN?

    Yes, torrenting with a VPN is completely safe, if you know and trust the P2P network you are using. Some people use P2P networks and torrent sites to spread malicious files, so you should always have your anti-malware program activated when you’re torrenting to protect yourself as well.

  • Can you go to jail for torrenting?

    No, you do not go to jail for torrenting or using BitTorrent. Torrenting is just a file copy protocol which moves files around the internet efficiently. However, you could get arrested for downloading licensed content without the appropriate permissions.

  • Why should I use a VPN when torrenting?

    You should use a VPN when torrenting because a VPN encrypts your traffic before it leaves your computer, meaning that your internet service provider cannot monitor your activity.

  • How dangerous is torrenting?

    There’s a fair amount of danger in torrenting, especially without a VPN. One of the greatest dangers associated with torrenting relates to the integrity of the files being shared. As one of the most popular and widespread P2P-sharing protocols, torrents are a big target for hackers, unscrupulous advertisers, and other parties looking to infect systems.

Citations
  1. BitTorrent. (2019). BitTorrent (BTT) White Paper.
    bittorrent.com/btt/btt-docs/BitTorrent_(BTT)_White_Paper_v0.8.7_Feb_2019.pdf

  2. Federal Trade Commission. (2021). PEER-TO-PEER FILE SHARING: A GUIDE FOR BUSINESS.
    ftc.gov/tips-advice/business-center/guidance/peer-peer-file-sharing-guide-business

  3. U.S. Copyright Office. (1998). THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998.
    copyright.gov/legislation/dmca.pdf

  4. Department of Justice. (2019). Eight Defendants Charged with Running Two of the Largest Illegal Television Show and Movie Streaming Services in the United States.
    justice.gov/opa/pr/eight-defendants-charged-running-two-largest-illegal-television-show-and-movie-streaming

  5. The New York Times. (2011). Putting the Brakes on Web-Surfing Speeds.
    nytimes.com/2011/11/14/technology/putting-the-brakes-on-web-surfing-speeds.html

  6. Ookla. (2021). Speedtest by Ookla.
    speedtest.net/

  7. ExpressVPN. (2021). WebRTC Leak Test.
    expressvpn.com/webrtc-leak-test

  8. DNSleaktest. (2021). DNS leak test.
    dnsleaktest.com/