Found this as I was reading about the supposed Comcast Bittorrent shaping controversy. A quick guide to enabling protocol encryption in the most common bittorrent clients, so that the upstream shapers can’t inspect packets to find bittorrent traffic.