This is why they don't want us using it.
They use more traditional means to go after people who used Silk Road or (ugh) the pedos, specifically because the anonymity factor works and they can't use modern tracing to determine the identity of users anywhere near as easily. So they use plants, they track real-world items when they're shipped, all traditional investigation techniques.I highly doubt there's any sort of back door or magic encryption key they can use to just figure out the personal information of anyone who uses TOR. The worst they can do is run their own exit node (I'd be surprised if they didn't have multiple exit nodes), which being the last stop on the encryption train, knows every page that's visited by specific connections. Tracing those connections through the peer nodes however is undoubtedly painstaking, and more than likely not worth the effort when you can much more easily just have some guy infiltrate a pedo ring as a user, or convince an existing member to rat out the others.
As for torrent files, they are small enough that they can be transferred through the drip-drop slow TOR network without issue for sure. If anyone ever decided to put together an onion site that housed torrent downloads, it could absolutely work. Torrent sites don't need fancy graphics, plain text descriptions and an apt directory of the torrents they house is all there needs to be. A torrent client could even be able to use that site as a tracker so long as it's got some TOR functionality built into the client, as very little information needs to come directly from the trackers.
After that though, you're right back to having to use the standard web for the actual peer-to-peer transfers, but there's steps that people already take (turning off peer exchange, disallowing incoming legacy connections, forcing outgoing encryption) to make it less likely that they'll leave an IP footprint that media companies can use to find them.
So the bottom line with torrenting, even if we can one day soon use TOR to help, is still discretion. You take a chance every time you download something, so you should be prepared for the possible consequences regardless of anything you do to protect yourself further from the average downloader. These days downloaders are really only in trouble with their ISPs, it's the uploaders that're the big fish worth chasing for the content owners.
Forgot to mention that with TOR there's a button that will change your path through the network on-the-fly. It's there for a reason, use it!
Want DP delivered to your inbox daily? Subscribe here: