I like to run qBittorrent on a Linux laptop to try and minimize the risk of Microsoft tracking what I’m doing and to protect my main system from viruses. I’m having an issue with it though. When I go into Advanced and select Network Interface, Proton VPN is not an option there. I only get lo, eno1, wlp4s0, ipv6leakintrf0, and tun0.
How can I get it to bind to the VPN so that I don’t have to worry about it freaking out and sending unencrypted data through qBit?
iirc tun0 is what youre looking for. it stands for ‘tunnel’ as in a network tunnel like a vpn.
been a while though, so you may want to wait for a second confirmation
Yeah that’s what OP wants.
Yep, that’s what it is on my system using Surfshark with OpenVPN.
Yes, that is what I do with the same setup
Tun0 is the interface that most vpns are using so I assume proton is the same.
Easiest is to use podman (or docker) with https://github.com/qdm12/gluetun
Easiest way is to just point qbit at the “tun0” interface from the network tab in the menu of qbit…point-click-done
I too use Gluetun for this on Unraid, amazing piece of Software!
Bind tun0 in the settings but what I do is run BitTorrent in a docker container with WireGuard so the vpn doesn’t effect my day to day browsing
I created a container that does this https://github.com/bubuntux/protorrent
i had all kinds of problems until i removed the vpn from the client. i setup a vpn container, and push all my private traffic over that.
setup a docker OpenVPN client like gluetun, connect to proton, set your local computer to use the container as gateway/dns
its not going to be point and clicky, and you should prolly get used to that for advanced stuff.
Manually configuring wireguard might work and protonvpn provides config files [1]. It’s unrelated to the issue, but wireguard additionally supports port forwarding which increases download speeds for torrents.
I’ve no idea why the network isn’t showing up.
Proton VPN Linux support isn’t as clean ootb. I used a docker image that supported vpns (with transmission) that works well and basically just uses the VPN for torrenting by providing an .ovpn config
Can’t you just turn the “kill switch” option on in Proton and then everything goes through it?
I use Mullvad with great success, give that a try. It has advanced configuration options baked in. Has GUI and CLI interfaces, and a dead mans switch for dropouts.
Hey, bud. If you don’t understand what an interface is, you might be in a bit over your head here. Also, if you’re not running VPN on your entire network at the gateway, running it on different machines like you’re describing isn’t stopping “Microsoft tracking”, whatever that is.
Just for shitsngiggles, the interface is the network device that is communicating with the Internet in your case. It’s either the wired Ethernet port, the WiFi card, or the VPN tunnel.
Also, if you’re not running VPN on your entire network at the gateway, running it on different machines like you’re describing isn’t stopping “Microsoft tracking”, whatever that is.
Not quite sure what you are implying but when i do understand OP correctly he only wants to hinder microsoft in tracking his bittorrent usage which this method is sufficient for.
Why would Microsoft be watching this person use their Linux machine for torrenting exactly? This entire thing reads like a paranoid fantasy.
If either of you is imaging that Microsoft is watching your public network traffic to catch you downloading your hentai, seek therapy and guidance.
Why would Microsoft be watching this person use their Linux machine for torrenting exactly? This entire thing reads like a paranoid fantasy.
I have not said that.
You were the guy who said that running a vpn on a linux machine is not enough to stop Microsoft from tracking you.
I am saying that a separate machine running Linux does the job preventing Microsoft to track/monitor your torrenting.
maybe he works for microsoft ;-)
How about you use MullVad?
I’m not being a dick. Proton had enough info on French climate activists to sell them out.
Extinction Rebellion types may be the most anemic politics I’ve seen in my life, so the idea they’re locking up people attracted to something that lame… it’s like locking me up for piracy. Fuck Proton.
Also Mullvad server’s are way better for p2p and they don’t try to get more money out of you.
Are you escaping NATO intelligence with my knowledge here? Fuck no. Look at Mullvaf’s servers list and it’s basically a rundown of every country whose security situation is bad enough that it likely permits the CIA to do what it wants.
Also your OS is compromised.
I’m not being a dick. Proton had enough info on French climate activists to sell them out.
Extinction Rebellion types may be the most anemic politics I’ve seen in my life, so the idea they’re locking up people attracted to something that lame… it’s like locking me up for piracy. Fuck Proton.
Source?
This is very easy to google (oh wait fuck i sound uncool now i meant http://xo.wtf/ search 🥲) there are hella articles about this. I don’t think either of these articles are where I read about it so retweets are not endorsements and all haha if they say some dumb shit in them I’m not reading Tech Journalism rn
It’s actually more complicated than that.
https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/
As usual, the devil is in the details—ProtonMail’s original policy simply said that the service does not keep IP logs “by default.” However, as a Swiss company, ProtonMail was obliged to comply with a Swiss court’s demand that it begin logging IP address and browser fingerprint information for a particular ProtonMail account.
ProtonMail also operates a VPN service called ProtonVPN, and it points out that Swiss law prohibits the country’s courts from compelling a VPN service to log IP addresses.
So ProtonMail is the problematic service, since it can be compelled by courts to log. ProtonVPN cannot be compelled to start logging.
Oh yeah I heard that part already, it’s more abt the org being compromised. WIRED regularly publishes articles that are clearly in coordination with the state department, by the way.
I’m too noided about this stuff, I have no reason to talk shit about Mullvad other than the locations of their servers and knowing that feds have high level wiretaps at datacenters that pretty much none of us can get around, and I’m still talking shit about them
Go listen to feds talking about their training in “physical penetration” if you want to know more lol. They go brag about this shit
Why are you downvoting losers lol??? They clearly are able to give your shit to police even if you pay them $50/year or something. You’re welcome, redditors
Only if you use ProtonMail. ProtonVPN is subject to different laws.
https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/
Have you ever heard the phrase “fool me twice, shame on me”
Yes. But people are allowed to make their own informed choices for themselves. I’m not here to tell people what risk is acceptable for them.
Well yea I’m clearly in agreement with ya since I only told OP this due to them expressing a worry abt privacy, they deserve to know. I almost began shoving instructions for switching to Linux down their throat haha
Mullvad doesn’t have port forwarding.
Are you saying I couldn’t run a minecraft server off it if I wanted to, for instance?
If that is going to be an issue, thanks for letting me know in advance. That’s kinda important 😭😭
Because I already pay for Proton for drive, mail, and other services. I’ve used Mullvad in the past, and I definitely prefer it as a simple torrenting VPN, but Proton offers a lot more.
That’s valid but I would still go with options that don’t bill themselves as private only to hand over info to feds. I like Tuta.mail because they don’t try to get a phone number out of me lol. Cloud services are abundant. You do you though, I get the feeling neither of us is slinging MDMA and privacy is just a technical requirement.
Don’t listen to them. Mullvad is a bad VPN for torrenting, they don’t even have port forwarding. Also tun0 is what you want to bind your qBittorrent to.
OP doesn’t event understand ports or interfaces.