It only takes a minute to sign up. Connect and share knowledge within a single location that is structured and easy to search. I used a dongle before getting a phone, but now use my phone as a hotspot. I don't want my phone to get malware or viruses. By just passing potentially malicious traffic through, it is very unlikely.
After all, routers on the Internet are relaying tons of malicious traffic everyday without getting compromised themselves.
However the danger begins when your computer itself gets compromised from a malicious file downloaded via torrents, and from there the malware on your computer could compromise other hosts on your network such as your phone. When your phone is acting as a hotspot it's basically just a router connecting two protocols together It's not actually interpreting any of the data passing though, as that would use a lot more CPU and memory. It's literally just passing data back and forth at OSI Layers 2 and 3.
That said, it's no different than other routers on the Internet when it's behaving like this, and all the other routers on the Internet which have malware, viruses, and all sorts of other bad traffic passing through them are not affected, because they are just passing encapsulated packets and not interpreting them. So any type of traffic passed in this manner, torrented or not, will not infect your phone when you use it as a hotspot.
Not really. The torrent data just flows through the phone, it does not analyze or execute the data except what is necessary to forward it to the PC. Also, remember that torrent does not always mean malware. If it has a "white external IP", it can be potentially hacked as all the rest of the addresses that can be accessed directly. If it's behind a NAT, then no problem. Content downloaded from the torrent may be or contain viruses and other malware's but torrent itself is not so.
Torrent files contain text and point out the trackers for a download to begin downloading from distributors known as seeders and requesting clients known as leachers. I think the mobile wouldn't get infected by merely using it as the hotspot device. The router or any device that routes the traffic is generally not affected by any kind of traffic flowing through it. Vulnerability for this transport are quite unlikely, which is more than extremely unlikely as for routers because Hotspot is not pure routing as other said.
That's a bit more processing than routing. This overhead is simply a bit more at risk of kernel code vulnerability than a router on internet. Because torrent is not a virus. It's a software or technique to share data worldwide securely. Its increasing greatly from last 1 year. When you download torrent your cellphone is working like a router just transferring the data to the end user without reading or executing the file.
Interpretation causes infection. No Interpretation, no infection. Passing torrent bytes doesn't do anything with the data except some tasks to just 'pass' them. Tethering is no harm for your phone :. One point not covered by the answers so far is that this may depend on how you're using your phone. If you're using wireless or bluetooth tethering , then as mentioned, its unlikely to be a problem, however if you're using USB tethering then there is more of a connection between the PC and the phone and if the security on your smartphone is configured to trust your PC e.
That being said I do not want to make confusion between Torrent and malware. Torrent is just a protocol and can be used to download a Linux ar BSD distrib without risk - provided you control the hash of the received file before using it. What is dangerous is to download codecs or other similar tools from uncontrolled sites and use them. Unlikely, The phone is simply acting as a router and does what a router does best, It's forwarding data between networks.
But if you are downloading torrents the only responsibility the phone has is to forward the level 3 packets to your PC. It does not de-capsulate the packet higher than level 3 nor can it run whatever executable or files you are downloading as it would not be storing the packets in order to be reassembled. Sign up to join this community. The best answers are voted up and rise to the top. Stack Overflow for Teams — Collaborate and share knowledge with a private group.
Create a free Team What is Teams? Learn more. Can I get malware on my phone, if my phone is tethered to my laptop downloading torrents? Ask Question. Asked 5 years, 8 months ago. Active 5 years, 7 months ago. Viewed 33k times. Can my phone get viruses if I use it as a hotspot while downloading torrents? Improve this question. Mat 7 7 bronze badges. Add a comment. Active Oldest Votes. Improve this answer.
TRiG 5 5 silver badges 14 14 bronze badges. Trey Blalock Trey Blalock 14k 6 6 gold badges 42 42 silver badges 49 49 bronze badges.
A VPN changes your public IP address which is the only personally identifying piece of information that appears in a bittorrent swarm. This makes torrent activity almost impossible to track. See why we recommend a VPN for torrents. Is a VPN Expensive? The number of VPN services has grown exponentially in the past few years and prices have dropped dramatically due to increased competition.
Any VPN service with strong encryption can help prevent throttling, but there are a few VPN providers that offer additional features specifically for bittorrent users. IPVanish is one of the very few VPN providers in the world that owns their own Tier-1 data network instead of just leasing bandwidth on other peoples network like most VPN providers do.
The benefit is that IPvanish customers get incredibly fast speeds and end-to-end data security. IPvanish is no a non-logging VPN provider. IPVanish allows torrents on their network. Their parent company was actually founded by one of the pioneers of peer-to-peer file sharing technology usenet.
For more details, features, and speedtests, read our review of IPVanish. Private Internet Access is one of the most popular VPN providers in the world, due to their excellent performance and features at low prices. PIA allows torrents on all servers, has super-strong bit encryption, and keeps no logs whatsoever. PIA also includes free Netherlands proxy service with their VPN so you can actually run your torrent client through a proxy server and then run your whole internet connection inside the VPN for double the protection.
In some cases this may help with ISP-based torrent throttling. Important Note: This in-client encryption algorithm is extremely weak and no substitute for a quality VPN.
Using a VPN is by far the easiest and most effective solution to the problem of slow, throttled torrents. We gave you suggestions as to which VPN providers might work well for you, but there are literally dozens of choices. David started torrenting before it was cool.
He enjoys hiking, strategy games and eats watermelon year round. He still rocks his Napster t-shirt once a month. Save my name, email, and website in this browser for the next time I comment.
David Barnes. Most have denied traffic shaping. Visit IPVanish. How to turn on protocol encryption in Vuze. Best Price Learn More 1.
0コメント