Torrent files, and the clients needed to interpret them, are, at present, the most reliable, sophisticated and, sometimes, secure, way to exchange information through the P2P or Peer to Peer networks .
These allow us to recompose all types of files that users have on their computers and are sharing on the network, so that we can download them to enjoy them.
Due to its increasing use, its usefulness and its questions regarding legality, copyright , ethics and other points to consider, it is interesting to know what exactly these files are, in what they consist of, how they are used and what they offer us, and that is what we will see next.
Index:
What is a Torrent file and what is it for? Definition
A torrent is a file with metadata storage capacity that can be used by a BitTorrent protocol client . This contains information about a destination file (URLs of various trackers), that is, it shows us what an X file is like but does not have its content as such.
What includes is the location of the parts of that content that we want to get . We can also find, in some of them, additional metadata, called “improvement proposals”.
The structure, encoded yes or yes with UTF-8 (Unicode and ISO encoding), includes:
- Announce : This is the URL of the tracker.
- Info : A versatile dictionary with independent keys.
- Name : A directory is suggested to save the content that is downloaded.
- Piece length : It is the weight, in bytes, of each piece.
- Pieces : List of hash that each piece has (the hash make the modifications detected, serving to avoid them).
- Length : Weight, in bytes, of the file once shared.
- Files : List of dictionaries, one per file (multi-file content, of course). Each one has, in turn, with:
- Path : List of strings of the names of the subdirectories, the end being the one that gives the real name to the file.
- Length : Once again, the number of bytes in the file.
Next, we come across other optional keys such as:
- Announce-list : Represent alternative crawler listings.
- Creation date : This is the date the torrent was created (UNIX format).
- Comment : It is free and allows you to report what you want.
- Created by : How and who created the .torrent.
- Private : It will indicate if it is possible to search for pairs keeping the indicated trackers aside.
Its operation includes, in fact, the division of the original content into pieces or informative fragments that are placed on different hosts , without limitation. This makes it possible, among other things, to quickly download heavy content.
A user, who will be a client on the network, makes a demand for a content, analyzes the torrent information to know where the original pieces are and recompose it after downloading.
What is the BitTorrent protocol and how does it work? Definition
This is a protocol of several that are established to enable and maintain a communication in P2P networks . It turns out to be the most common and is based on the transfer of files (large size) by recomposition of its parts, hosted on different hosts. This protocol appears in 2001 and has recently been acquired, due to its success, for $ 140 million .
There are many clients (softwares) that are based on it and, in turn, can be used in various OS. This increased when the closure of the well-known Megaupload website occurred, changing the usual way in which the download and (or file sharing) takes place.
This protocol works with .torrent files , its operating method being the one we have already seen: creation of an original file, creation of .torrent, conventional distribution of this, use of nodes to have availability in BitTorrent clients (seeds) , demand for content by a user ( .torrent execution from their client ), node creation by this new recipient user , exchange of the parts with the seed and, having them, with other users that will become recipients.
An interesting aspect turns out to be the possibility of continuing the download wherever we leave it , doing it in several sessions. This is precisely due to the operation of downloading parts. The customer is ordering the ones you get and detecting the missing ones, so you should simply look for the ones that are not in your team to continue, without you losing anything.
Structure of a BitTorrent network
The best thing about this type of network found in BitTorrent is that its structure is quite simple. This includes:
- Peers : Each of the users that make up the network.
- Leechers : Translated as “leeches”, are the users who are sucking a file but do not have it completely, that is, they are downloading. Descriptively, this name is given to that unsupportive user who downloads content but prevents other users from downloading it from their computer, disabling it.
- Seeders (seeds) : They are users that have the file and those that are therefore downloaded.
- Trackers : It is the server (tracker) that, even without being part of the communication process implicitly , allows the connection of the pairs. It is with this resource that it is possible to know who has the file.
- Swarm : The set of users that the server is looking for is called as “swarm.” > Metainfo file : This is static.
The first thing that is essential is to prepare the server:
The operation of the service is given as follows:
For this to happen, it is taken into account that the rarest pieces of the file will be downloaded first . This is determined by an algorithm that works with the number of copies that exist of the pieces according to sets of pairs, determining the next pair of which we will suck the content.
Advantages
The positive aspects of BitTorrent and points that can be added to improve it are:
- Real content : The main advantage we have when using this method is to ensure real content, which is what it promises to be, and not another type of file or even malware. This has always been a major problem of other P2P network protocols that allowed the user to continuously download, due to ignorance, corrupt or false files.
- DHT extension : A node retains certain Information from your close colleagues. In this way, even if one falls, among the others, much of their information will be available, which can be downloaded even when it is out of operation. It is, in a way, to decentralize part of the protocol.
- Web sowing : In addition to the seed download model of other users, at least one complete archive of the downloads can be made.
- Superseding : This method allows the first seed of a file to be defragmented in a smaller number of them, so that there are fewer parts to find , recognize and download and, therefore, the content is available more quickly. On the other hand, the pieces cannot be downloaded together, but any user who has one must share it first so that the user who has the complete file will pass the next one; in this way, everyone’s participation is encouraged while promoting the transfer of new content.
- Large number of options : The proliferation of this form of file transfer has made multiply the websites that include linked to the .torrent as well as specialized search engines have even appeared to search for (worth the redundancy) this type of files.
- Blocking corrupt IPs: A record of the blocks that each IP makes available to others remains. When one of them sends too much corrupt content it is blocked, so that the system is always more or less clean of harmful users.
- Reduction of the impact of heavy content distribution : He is credited with having led to this reduction considerably, allowing the servers to breathe.
- Mobile nodes : Dismembering the contents means that mobile devices can also do node times, sharing at least small fragments.
Disadvantages
On the other hand, we have some points that make or could make the user experience not all the positive that is sought:
- Economic model protocol : This makes it possible for a user to download and download without sharing anything or just nothing (only for as long as he stays connected to download what interests him) . Another consequence is the possibility of creating false identifiers of the same pair that is dedicated to attack, using data only to him. Unfortunately, this protocol is not in the best conditions to deal with malicious clients, although some aspects have been improved as much as possible.
- Unsupportive action : It is very common, as we have already mentioned, the user who moves only for his own interest and who, once he downloads the file of his interest, lays access to the content he has and disappears, moving away from the desired download / upload rate for Maintain the system Thus, the new content spreads quickly the first few days but it can even die if it falls into the hands of users who do not usually connect to the network often. This attitude is already being corrected with algorithms and thanks to the incorporation of private trackers, which record traffic statistics and expel those who move away, positively, from the value 1 for the mentioned rate.
- Private crawlers : However, this new resource also turns out to have a negative aspect, and it is the total traffic consumption, which makes it even act as a bottleneck. Others are the impossibility of connecting new pairs if the tracker falls or the formation of disorganized islands.
- Unsuitable for small files : It is not, at all, a suitable method to transfer Small files per comparison with the large bandwidth used.
- Content search : Clients do not allow content search; it is necessary to use external websites where farms of .torrent files are created.
List of the best programs or clients to download Torrent files
Finally, we leave you with those who are, for the moment, the P2P software with BitTorrent protocol that are better working . Know that there are two different types, those that allow multiple download and those that require the completion of one to start with the next.
uTorrent
For the majority it will be the most famous or even the only one they know . This is because it is simple, very easy to use and offers very positive results. So … what are you going to look for another?
It has been one of those that has been seen, also, more involved in scandals but still it is still used a lot and remains on the podium; Ask anyone for a P2P client and you will see that there are very few who do not recommend it.
One point that I really like is that there is also a uTorrent website , so you don’t have to go crazy to search for the files, it has no loss. This, moreover, is very well structured, being very easy to navigate through it and find what you are looking for.
They become negative points such as advertising (which you will see that is repeated in the following examples of the list, it is not exclusive to uTorrent), the weight of the newest versions and the fact of not Be especially sure as to what you download. You can also check out the best torrent file download pages still open .
qBitTorrent
Another of the great ones recommended by being free and free , as well as having varied functions and high performance. It is done with a place on the podium for its balance.
It is considered as a star option for those teams that work with the official repositories of Linux, macOS from Yosemite to Mojave and Windows from XP (although the 64-bit version does not work precisely in This version starts with Windows 7).
WebTorrent
Free, modern, very simple, fast , and ideal for those who begin to investigate this file-sharing network.
The download is very simple, enabled both by opening the .torrent file and the magnet URL. Yes, you have both a desktop version and a web application. You can use it on Linux, macOS and Windows .
BitTorrent
This is the official client of this homonymous communication protocol, which, in turn, is also the owner of uTorrent . So much so that you can check the similarities with this from the beginning, because it is nothing more than somewhat modified software, mainly visuals.
It has a free version and also a paid version that offers you the non-reproduction of advertising for almost 20 dollars per year. This also includes features that may be of interest such as an antivirus, a file converter and even a media player. You can use it with both macOS and Windows and, eye, also on Android .
Tribler
If it is the ideal option for those who want to maintain privacy then use a private network that enables our anonymity. Security and privacy are also configurable in different aspects.
The method of operation is somewhat different from that of the others, and it involves having up to 3 active proxy servers at the same time between those who issue and who receives the files. It also has a media player, well known in this case: VLC .
It’s free and can be used in versions 7, 8 and 10 of Windows, in Ubuntu Linux and in macOS from Yosemite.
BitComet
Another one that is free and similar, in aesthetics, to the vast majority. It has remote access, bandwidth programming options , data recovery and, eye, a virus scanning tool. In addition, if you use eMule , you can also use the network by activating a plugin.
Like many others, play ads. It should also be noted, as a negative, that is only available to run on Windows computers .
Vuze (old Azureus)
It is the oldest client based on BitTorrent (with the exception of its own) that is still active (since 2003), with support and also as a top option. And it is, for many, the most powerful due to the various features available to it, counted by tens, if you get the Vuze Plus version , of course. It includes multimedia support, direct folder for iTunes, shutdown of the equipment at the end, integrated navigation for the search for torrents …
If yours is the download and period, you have Vuze Leap , which is nothing more than a cut that offers the basics, and nothing more. This client includes ads, something to consider but which, on the other hand, is common if we consider everything it offers for free.
BitLord
Among its features, functionalities and possibilities to highlight are the password protection of the client , the possibility of streaming during downloads, the inclusion of RSS and the search for torrents within the software.
As a negative point we find that our team can call it insecure , with their reasons, as many cases have been reported in which its installation has meant that files are sneaked or changes are made of which we are not aware nor, much less, have we requested. Its availability is somewhat more limited, making it possible to use it in macOS and Windows .