Bittorrent always had two key problems: non-existent indexing services and lack of anonymity. Several solutions have been published from time to time to eliminate the latter weakness and all rely on the use of virtual private networks or proxies. Regarding the first issue, ie a viable alternative to indexing services, there is probably nothing worthwhile.
The Tribler, which went public in the summer of 2014, attempts to change all that. Developed by researchers at the Delft University of Technology who wanted to create an anonymous system and impossible to shut down at the same time.
Tribler integrates both the above-mentioned services, the indexing of torrents and the anonymity of each client directly, which means that it is not based on third-party services or other websites.
Tribler's great feature is anonymity, which is now possible with its latest release. It uses a system similar to what the Tor network offers, but has its own network that is incompatible with Tor.
Detailed information about the application is available at Github. The routing of applications is shown through the different systems of each user who uses it automatically. Instead of downloading files directly from the seeder, they are downloaded and diverted through other users.
This means that each user of the Triller network is a node that is used to transfer data to other users, which in turn can affect your overall download speed and your ability to seeding the files.
Packets received in this way are encrypted with the exception of the header (header) that carries only an identifier used to determine where to send the packet.
The Triller also comes with built-in search options that you can use to find torrents directly from your application without having to use any website. It also supports channels with torrent collections offered by other users, which users can vote to improve their search visibility.
The idea of Triller seems meaningful, but it is too early to tell if it will be accepted by the online audience. The security and anonymity of the service should be subjected to third party control, so that we can safely say that everything works as promised by the researchers developing it.
You can download the application from here.