• redcalcium@lemmy.institute
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 year ago

    People behind cgnat is probably less likely to seed and thus less likely to get their IP address logged by these outfits. That’s just my pet theory though, not sure how to confirm it. Anyone ever heard of someone behind cgnat and still got the love letter?

    • kungen
      link
      fedilink
      English
      arrow-up
      10
      ·
      1 year ago

      My ISP uses CGNAT but I have a public static IP from them. 10+ years of heavy usage and not a single letter.

    • AgnosticMammal@lemmy.zip
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      Idk about the “less likely” demographics. My ISP had static IP until they dropped it for dynamic IP behind a CGNAT, and no longer offered the chance to buy a static IP.

    • WarmApplePieShrek@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      This is a good way to hide, actually. Port forwarding connections are easier to trace long-term. If you make the downloader port forward instead of the uploader, the one who’s easily traced is the one who’s in less trouble and the real targets stay hidden. But leechers are lazy and won’t do that. Some Scene FTPs do this.