• @[email protected]
    link
    fedilink
    English
    118 months ago

    People behind cgnat is probably less likely to seed and thus less likely to get their IP address logged by these outfits. That’s just my pet theory though, not sure how to confirm it. Anyone ever heard of someone behind cgnat and still got the love letter?

    • @[email protected]
      link
      fedilink
      English
      108 months ago

      My ISP uses CGNAT but I have a public static IP from them. 10+ years of heavy usage and not a single letter.

    • @[email protected]
      link
      fedilink
      English
      38 months ago

      Idk about the “less likely” demographics. My ISP had static IP until they dropped it for dynamic IP behind a CGNAT, and no longer offered the chance to buy a static IP.

    • @[email protected]
      link
      fedilink
      English
      28 months ago

      This is a good way to hide, actually. Port forwarding connections are easier to trace long-term. If you make the downloader port forward instead of the uploader, the one who’s easily traced is the one who’s in less trouble and the real targets stay hidden. But leechers are lazy and won’t do that. Some Scene FTPs do this.