Quote from: UltimateSolution on November 13, 2012, 11:11 pmQuote from: pine on November 13, 2012, 09:20 amQuote from: Dread Pirate Roberts on November 09, 2012, 09:54 amhttp://www.imdb.com/title/tt0434409/http://thepiratebay.se/torrent/3495660/V.For.Vendetta%5B2005%5DDvDrip%5BEng%5D-aXXoLook the movie is great and all, but linking to a specific torrent file was a mistake. Downloading that file would be a great way to deanonymize SR users. :(Haha seriously? COME THE FUCK ON. What are they going to do? Even with an IP they can't just get your identity or address without a warrant, even with a warrant what are they going to do? The torrent has 2000 seeders from allover the world, I'm guessing like 20-40 people will download it from here. Are they going to start intercepting the mail from 2000 people and hope to intercept something?You're not being overly paranoid you're just being stupid, no offense.They are going to store all IP addresses downloading that torrent within a set timeframe, or given the nature of the torrent itself, perhaps for all time. Each IP address will be connected to an RL address.Then they will correlate those IP addresses with other intelligence data they will have been acquiring since last year. The eventual result is a relatively small subset of users By itself, it may not be incriminating, but in combination with other data it is possible to narrow down the possibilities, sometimes quite dramatically. This is called an intersection attack, referring to the Venn diagram concept of two sets having something in common. This algorithm is classic example of detective work.The paranoid survive. -- William Gates.