Category Archives: Essays

A Method for Measuring IQ Based on Preferred Mouse Pointer Speed

The correlation between intelligence and reaction times is well supported in the science of psychometrics[1]. In this article a potential method for accurately measuring a computer user’s IQ is laid out, based on their preferred mouse pointer speed (the ratio between physical movement of the mouse hardware and movement of the pointer on the device’s screen). This method can be implemented by scientists to screen subjects for IQ studies, and by online advertisers to target a particular IQ demographic. Study designs and caveats are discussed.


As someone who prefers an extremely fast pointer speed on the computers I use, I’ve found that when I let others use my computers, they find the pointer speed unsettlingly fast. While working on a data entry job that required me to copy data from a table on one browser tab and paste it into a web form on another tab, I noticed that with my high pointer speed, I always overshot the targets I wanted to click, then slowed the pointer to a stop, and upon an attempt in the reverse direction at a slower speed, I was able to accurately click the thing I wanted to click.

This sounds like an inefficient method of using a computer, since it requires added cognitive load to reverse direction and go toward the target at a different. My hypothesis is that given a particular level of cognitive processing rate (IQ or reaction times), this overshoot-and-correct method of pinpointing a target on a screen actually saves time and allows the user to complete tasks at a higher speed than if the pointer was slower and the user was able to pinpoint a target with a single attempt.

It is likely that most computer users use the overshoot-and-correct method for pinpointing targets. What interests here is that the faster the pointer speed, the higher the cognitive demands of the overshoot-and-correct method becomes, so that there is a point on the IQ-pointer speed curve at which a particular IQ achieves maximum efficiency (enables the user to be maximally productive at the task they are performing):

The above chart is a hypothetical illustration of the relationship between IQ and mouse pointer speeds, based on a diminishing-returns model.

An Empirical Test of the Hypothesis

A group of subjects, using identical computers, are given a data-entry task to perform. The task involves accurately copying tabulated data on one tab of a browser screen and pasting it in a form on a second browser screen that only accepts one row at a time. The users will click a “submit data” button, at which point the page reloads and the users enter the data for the second row from tab 1. The users are rewarded based on task completion time (not the per-row speed but the speed at which they complete the entire test, perhaps taking 30 minutes) and accuracy.

The browser window should take up only part of the available screen (perhaps two thirds). In the remaining screen space a window is shown that the users can use to control the mouse pointer speed. By default, the mouse pointer speed is set to the slowest possible setting, so that all users will require to adjust the mouse pointer speed to a comfortable level. The users are informed by the researchers that they can increase their efficiency (and potential rewards) by increasing the mouse pointer speed. They must also be informed that if the pointer speed is too high, this can negatively affect their performance.

The time required for the completion of the task should be high enough that the amount of time spent on adjusting the mouse pointer speed should only have a minor negative impact on the completion time. The completion time should also be long enough for the users to find their efficiency-maximizing pointer speed. At the beginning of the task users may choose an unnaturally high speed that slows them down by creating a too high cognitive demand. But given enough time, as mental fatigue sets in, users will likely slow the pointer down until they reach a level of “comfort”. This point of “comfort” is what the researchers are seeking to find out, the point at which the pointer speed is at the maximum speed it can be without overtaxing the brain.

A time of at least 30 minutes will probably be required for the study. A time of one hour might provide further accuracy.

At the end of the study, the researchers will gather the subjects’ mouse pointer speed setting, task completion time, and accuracy. Using the following equation, a score can be given to each subject:

score = mouse pointer speed setting * (1/task completion time) * percentage accuracy

Thus a subject who used a pointer speed setting of 1.5, completed the task in 45 minutes with an accuracy of 99% will have a score of 1.5 * (1/45) * 0.99 = 0.031, while someone who used a setting of 2.5, took 40 minutes with an accuracy of 98% will have a score of 2.5 * (1/40) * 0.98 = 0.061.

Task Design Concerns

The best type of task for this study is one where the best users do not finish the task at significantly less time than the average user. Otherwise, if some users finish at 15 minutes when others take an hour, the study might actually be testing for the subjects’ technical proficiency at copying and pasting data and switching tabs than for their pointer speed point of comfort.

Another concern is the use of keyboard shortcuts, which can significantly enhance task completion time. For this reason subjects can be given computers without keyboards, or if using laptops computers, the keyboards should be covered with a material that effectively prevents the subject from using it.

Generalizing the Results

Using JavaScript code embedded in the browser tabs used in the study, a pixels-per-second value can be derived that can be used to compare pointer speeds across browsers, operating systems and hardware set ups. A standard IQ test given to the subjects (perhaps on a different day to reduce the effects of mental fatigue from the task) will determine their IQs. The researchers can then study the correlation between user scores, their preferred pointer speeds measured in pixels-per-second, and their IQs, which according to my hypothesis are all going to be highly correlated.

In this way, a formula can be derived that given a particular pixels-per-second, produces the IQ of the user with reasonable accuracy. This formula can then be implemented in JavaScript and embedded in web pages. Websites can use it to determine the IQs of their visitors. Advertisers can use it to make their highly irrelevant ads slightly less irrelevant.

Touchscreen Devices

This IQ-measuring technique will not work on touch devices due to the lack of a mouse. While an interaction-latency technique can be developed (how a long a user takes to interact with the various prompts and other buttons on an app, for example), this will be less useful than the mouse pointer speed technique due to the fact that there is no overshoot-and-correct phenomenon going on. We are left with the much less useful data point of how long a user takes to interact with an app, which is affected by the app’s user experience design, the user’s familiarity with the app, and the size of the screen of their device (whether they can reach the button with the a finger on the same hand that is holding the device, or if they need to use the fingers on the other hand).

The point here is that while on a computer, a generalized tool can be develop that can be embedded on any website to measure a user’s IQ, on touchscreen devices, no such general tool can be developed. On a computer, the generalized tool can instantly tell the user’s IQ without having them do a test (by simply measuring their mouse pointer speed setting), while on a touchscreen device the user will have to be tested and measured for their IQ to be found out.

Accounting for Technical Proficiency

Probably a large percentage of the population are not proficient enough to know how to change their computer’s mouse pointer speed, meaning that they will be stuck with the default pointer speed that comes with their computers. And even more importantly, many are probably unaware that increasing pointer speeds can improve their computer experience. I have seen people use computers with cumbersomely slow pointer speeds, needing to pick up the mouse and drop it somewhere else on their mouse pads to continue finishing a single mouse movement.

For this reason, it must be determined at which IQ level a user becomes self-observant and proficient enough to know that increasing mouse pointer speeds can have a benefit, to know that this is possible on their system, and to know how to do it (or find out how to do it with an internet search). As a hypothetical example, an IQ of 110 might be needed for someone to have the self-observance and proficiency to set their pointer speeds to their comfort levels. This means that if someone has a lower pixels-per-second rate, we cannot accurately tell what their IQ is. It might be 85 or 100. They don’t know how to change their computer’s pointer speed, therefore their pixels-per-second rate alone cannot reliably predict their IQ.

This is partially (or largely) mitigated by the fact that a user can choose to move their physical mouse faster or slower, regardless of the pointer speed setting, so that they can achieve their desired pointer speed. Therefore using the pixels-per-second as a measure of IQ might be highly accurate except in the circumstances where a user’s mouse pointer speed is set so low that moving their hands faster cannot overcome the slowness, or when the mouse pointer speed is set too high and the user cannot adjust their hand movement to slow down the mouse enough.

Improving the Dataset

The previous study I described can be used to establish whether there is any truth to a correlation pixels-per-second pointer speed rate and IQ. However, for industrial application, a different type of study is required. Instead of building a pixels-per-second to IQ database based on lab-derived data, a more accurate picture can be drawn by having subjects take IQ tests in the lab, but having them visit a web page on their home computers that records their pixels-per-second rate and sends the data back to the researchers.

In this way the real-world correlation coefficient between IQ and mouse pointer speeds can be established that accounts for the various factors that affect the measurement, such as different software and hardware set ups and different times of day.


[1] Jensen, Arthur R. “Why Is Reaction Time Correlated with Psychometric G?” Current Directions in Psychological Science 2, no. 2 (1993): 53-56.

Islam, the Good Parts: Guaranteed Basic Income for Women

One thing that is rarely mentioned when speaking about Islam, even among Muslims, is that Muslim women don’t have to work. They can work if they want to, but they don’t have to if they don’t want to.

Islam makes it the duty of a woman’s male relatives to take care of her financially. Men have to provide for their sisters, mothers, wives and daughters. This is not merely an act of charity that men are encouraged to do. It is their legal duty. In a devout Muslim society, no woman can ever be homeless as long as she has a self-respecting male relative.

This provides a tremendous sense of freedom for women, including single women, who want to do creative work. They can focus on doing what they like, for example growing a small business or a writing career, while enjoying freedom from the stress of having to earn a living. Instead of having to work for potentially abusive employers or customers, they will have the option of only choosing jobs they like and leaving whenever they want.

In a country like the United States where two incomes are often necessary for a small family to maintain a dignified existence, it may seem unrealistic (and potentially unfair to men) for such a system to be implemented. How can a few men provide for so many people? The answer is Islam’s mechanisms for wealth-preservation and the encouragement of productive investment that ensure the super-wealthy can never get too financially powerful and collude to lower wages as has happened in the United States, and also ensures that a single stream of income is generally enough to feed a large family. These mechanisms, such as the ban on interest and the speculation tax, will  be discussed later on.

There is one flip side to the system that needs to be mentioned. When inheritance is distributed, women receive half as much as men. Since Islam puts all financial duties on men, it rewards them by giving them a larger share of inheritance, as men’s wealth is, after all, also partially women’s, as a man is obliged to take care of all of his close female relatives. Islam, however, doesn’t run away with the idea of a male-provider society by giving all inheritance to men, since not all men can be relied upon to be good and fair care-takers of women. It also doesn’t run away blindly with the idea of equality by giving men and women equal shares of inheritance when it has burdened men with heavier financial duties. It chooses a middle ground between the two extremes. It gives men more duties and a larger inheritance, while also providing a fall-back in case of unfair and undutiful male relatives by giving women a half-share of inheritance.

The virtues and evils of such a system can be debated. Why not give men and women equality in all things? Islam’s view is that men and women are not identical when it comes to all things. It assigns different rights and duties to each sex depending on their particular strengths and weaknesses.

The main issue at question here is this: Is a system that takes the differences between the sexes into account more likely or less likely to be fair, compared to a system that assumes men and women are exactly the same? Is it unimaginable that differentiating between the sexes can lead to a fairer system of rights and duties compared to turning a blind eye to all differences?

Feelings run high when this matter is discussed. The only way to resolve the matter is to undertake large-scale scientific studies to find out whether sex-aware systems lead to better societal outcomes compared to sex-blind systems.

Does it improve the mental health and happiness of women for them to know they will never have to work, and for them to know that there isn’t one chance in a million for them to ever be homeless (given the potentially dozens of male relatives eager and willing to take care of them if they lose their homes or jobs)?

Does it increase or decrease a woman’s chance of career advancement for her not to have to worry about making a living while she focuses on her studies or work? Or is it better to put her in debt and compel her to work as a waitress or bartender so that she can make ends meet while she studies or grows her small business as it is done in the United States?

If we cherry-pick facts and anecdotes, we can make either system look good or bad, but rigorous and empirical comparisons can be done. We can fully resolve the debate through decades of unbiased social research  that compares the outcomes of an Islamic system to competing systems.

Any comparison’s of an Islamic system compared to others will have to take account of IQ, as IQ is the most important factor in determining a population’s prosperity. India is much poorer than China, for example, not largely because of Hinduism versus Communism or Buddhism, but because India’s average IQ is in the mid-80’s, while China’s IQ is above 100. Populations of equal IQ tend to converge toward having the same level of prosperity. China is in the same league as South Korea and Japan when it comes to IQ, so it is practically certain that it will reach the same level of prosperity as these two countries within a decade or two. India, however, is in the same league as the Dominican Republic and Paraguay when it comes to IQ, so as it develops, it will converge toward the same level of prosperity as these two countries. Of course, different population sizes and natural resources will affect things, but not to a great degree, and the larger the populations of the countries that we are comparing, the smaller will the effect of natural resources become. To study this topic further, I recommend the book IQ and the Wealth of Nations by professors Richard Lynn and Tatu Vanhanen.

To have a fair comparison of an Islamic system compared to others, we can compare ethnic Japanese Muslims to ethnic Japanese non-Muslims in Japan (similar IQ, same country) and see how Islam’s system of rights and duties affects the Muslim population compared to the non-Muslim one. Are ethnic Japanese Muslim women happier, more productive, more mentally healthy compared ethnic Japanese non-Muslims, or not?

Unlike Communism, whose adherents can claim that it wasn’t properly implemented when it fails, the Islamic system can be scientifically tested. The requirement is to account for IQ and devoutness (a Muslim who uses credit cards, mortgages and for-profit insurance is not following Islam properly and should not be counted toward the Muslim side). Examples of devout Muslim populations that can be studied are the conservative Muslim middle classes of Egypt and Malaysia. Egypt’s conservative Muslim middle class can be compared to the middle classes of non-Muslim countries of similar IQ (low-80’s), such as Honduras, Nicaragua and the Dominican Republic. And as for Malaysia (IQ 92), we can compare the conservative Muslim middle class there with the middle classes of Greece, Ireland, Bulgaria and Lithuania.

How Political Exploitation of Muslim Immigrants by America’s Liberal Elite is Endangering Lives

There is something strange going on with the liberal political elite in the United States. Clintonland liberals have no qualms about the wholesale slaughter of Muslims outside the United States. US-sponsored conflicts have resulted in the mass murder of one to two million Muslims over the past 15 years. The liberal president of hope and change, Obama, wins the award for being the first US president to approve the extra-judicial execution of a US citizen through a drone strike, a citizen who was Muslim and 16 years old at the time.

As a Muslim I am glad Trump won. Because Hillary is creepy. Really creepy. As if Obama’s continuation of the US policy of perpetual war in the Middle East wasn’t bad enough, Clinton was promising to escalate things further, even risking war with Russia in the process.

Despite liberal apathy toward the mass murder of Muslims around the world as a direct result of US policies, inside the US, the liberal elite are to be seen pretending to be protectors and representatives of Muslim interests. Clinton loved showing off her token Muslims during her rallies.

Why do the liberal elite love US Muslims so much? Because they think of Muslims as guaranteed Democratic voters. The Democrats are importing Muslims at an industrial scale, without proper screening, and without any thought to the possibility that some of the people they import may have no good intentions toward the United States. The Democrats are desperate to import voters as that is the only way they can maintain viability as a political force due to the simple fact that conservatives are growing faster than liberals in the United States.

Ohio State University stabbing attacker was imported through Obama’s voter importation policies.

Some of these imported Muslims then carry out attacks in the United States in the name of Islam. This increases resentment for Muslims in the country and leads to revenge attacks on Muslims who had nothing to do with the importation of the attackers and the ideologies said attackers believe in.

It is a testament to the tolerance of the American people (and to the power of the police state and corporate media) that there have been no pogroms against Muslims in the United States even though month after and month and year after year Muslim attacks on US citizens continue to mount.

And to make things even worse, liberals launch pathetic defenses of these terrorists in the media with no consideration for the poor victims of the attacks, not out of love for Muslims, but because they know they themselves are responsible for these people being in the country in the first place.

The Ohio State attacker himself seems to have been a victim of another liberal policy (besides the liberal policy of voter importation): The promotion of the White racism narrative to attract voters to the Democratic side (which the liberals exploited in the 2012 congressional elections to their loss). He was taking a class that covered “micro-aggressions”, a theory that promotes anti-White paranoia among non-Whites by encouraging them to see White racism everywhere.

Liberals import hundreds of thousands of Muslims into the country every year, knowing that due to their poverty they will be dependent on government welfare (the thing that liberals use to attract the poor to their camp) for years and possibly decades. They then expose these imported voters to liberal propaganda designed to show them that the average White American hates them, to further push them toward the Democratic side. And as anyone with a functioning brain can predict, this practically ensures that the US will continue suffering terrorist attacks month after month. The people that are being imported are constantly being told that they deserve to fight back, that it is the fault of White Americans that their countries are poor and dysfunctional in the first place, and that they will continue suffering from White oppression while residing in the United States. They will believe all of this nonsense because it is other Whites saying it, at universities and political rallies, in newspapers, magazines and on TV.

Who suffers most from this insane policy of importing people and teaching them to hate the locals? It is the five to ten million Muslims who are already here trying to lead peaceful and normal lives, as hatred and prejudice against them increases despite the liberal media’s best efforts to censor the identities of terrorist attackers and blame the attacks on White people.

I am afraid we might be on the road toward a major disaster. The liberal elite (in the US and Europe too) continue to test White people’s tolerance by importing refugees that are orders of magnitude more criminal than the local populations. There is only so much rape and murder that White people can suffer before they decide enough is enough.

What I fear is that Muslims will be blamed for all of this, when they have been nothing but tools used by the liberal elite to ensure perpetual rule over the population through inflating the number of liberal-leaning voters and weakening and dividing the native population by pushing them into corners (either you support liberal policies, or you are a conservative racist).

There is hope that by putting a stop to the mass importation of third-world immigrants, Trump can reduce the stress on the pressure-cooker that the liberal elite have turned America into, so that things can settle down a bit.

How to: Become wise

If you want to become wise, read 100 books that interest you. The books you choose to read can be about any topic and they can be of any quality, good or bad. The important thing is that you should find them interesting, because the fact that you find a book interesting means it contains information that is new1 to you (and thus it increases wisdom), because “interesting” simply means “something that provides new information to the brain”.

No book is going to solve all of your problems. Each book may make you a 1% wiser person. Thus if you want to become double as wise as you are now, you would have to read about 70 books. 100 books would be a safer number.

Some of the books you read will contain false information, because almost any book will contain some claims and assumptions that are false. But if you don’t give up and continue reading books one after another, as your knowledge increases, so will your awareness of what is true and what is false. Wisdom is simply a map of reality (accurate information about how things really are), and each book you read (even a simple story) tries to give you a small piece of the map. Some books will give you false pieces that do not describe anything that actually exists on the map. But as you read more books, your knowledge increases about the other pieces that surround the false piece, and thus you start to have an intuitive sense of what the false piece should actually look like, and thus you recognize the false piece for what it is: false. Recognition of the falsehood in itself increases your knowledge, for your brain can abstract the patterns of falsehood, and it can actually build a map of what falsehood itself looks like, and thus it will become increasingly hard for falsehoods to mislead you.

If you start to read a book that at first seems interesting, but eventually lose interest in it and start to find it boring and tiring, you should feel no qualms about abandoning the book and starting another. When this happens, it can be due to one of two things:

  1. The book does not contain anything that’s new to you, and thus your brain recognizes it as a repetition of things that you already know very well, and therefore you brain is asking you to stop wasting your time with the book.
  2. The book contains information that has too many prerequisites, and thus your brain is not equipped to handle the information. You should abandon the book now and return to it after reading many other books.

Spend a year doing this and at the end of it you may laugh at how unwise and biased you used to be a year ago. During your journey you would have picked up some new biases, therefore it is unwise to stop your journey. Continue reading books and these biases will be cleared up. You will never stop picking up biases, but their frequency will decrease as your wisdom increases, for biases have patterns of their own and the wise mind can learn to avoid many of them. This is why you find the wisest people to be those who are least ready to make final judgments on any topic–they are “open-minded”, knowing when they do not have enough information.

In most cases, when it comes to most topics, humans rarely have perfect knowledge, therefore the wisest often refuse to give final answers on anything or to give counsel freely to those who ask for it. They will speak about what they know, and refuse to delve into what they do not know.

/ No Comments on How to: Become wise

How cyber pirates anonymously torrent movies on the internet

We all know that you, as a law-abiding citizen, would never download a car. And yet there are people out there who download movies for free and refuse to add a few more bucks to the billions of dollars that movie studios squat upon. There are film executives who, thanks to cyber pirates, only have a net worth of $100 million instead of $101.

So how do they do it? How are these cyber criminals subverting our democracy and freedoms to acquire knowledge and entertainment for free without making the wealthy even wealthier? It all burns down to three simple letters: I2P.

I2P, or the Invisible Internet Project, is a project that enables anyone anywhere to download information in a way that makes it impossible for anyone to track them or reveal their identity. Many experts at the CNN agree that our democracy is in great danger when we freely allow citizens to practice speech that is genuinely free. Speech needs to be controlled and approved by the the government, for our own security, and most importantly, the safety of our children. The cyber police work tirelessly to prevent free speech from actually taking place; but the pirates have found a home in I2P where no one can catch them.

I2P is slightly like TOR, which you may have heard of. However, unlike TOR, I2P is not used to browse normal internet sites (though it can be used that way), rather, it has its own sites, such as stats.i2p. And unlike TOR, I2P supports and encourages torrenting; it even has a built-in torrent client that is ready to go as soon as you install I2P.

Cyber pirates follow the following steps when they download high quality Blue Ray movies, ebook and textbook collections, and the latest Battlefield video game anonymously. We can show you the steps since downloading, installing and using I2P is perfectly legal under current laws (so long as you do not intentionally seek out and download copyrighted movies, books, songs, etc., see step 18 below for more clarification on this).

  1. First, they visit the I2P site to download the I2P software:
    If the site is for some reason down or has moved, they can easily find the new site by Googling “download i2p”:
  2. Then they click the I2P download link to download the I2P software:
  3. Below is a picture of the finished I2P software download:
  4. They may then do a signature check to make sure their version of I2P has not been tampered with. You can read TOR’s guide for how to do this, and apply the same logic to I2P.
  5. Once I2P is installed, they do not run it. They will set up a browser to be fully dedicated to I2P. This means that the browser will be able to browse I2P websites, but not ordinary internet sites. In our example we show how the Opera browser can be configured to handle I2P. They click on the Opera button, then point to Settings->Preferences:
  6. Then they click the Advanced tab:
  7. Then they click on the Network section, then the “Proxy servers” button:
  8. Then they make the following changes to the window that pops up, then click “OK”:
  9. Once they are done setting up Opera, they start I2P. There are two programs, and it doesn’t matter which one you run, the only difference is that the second one has a restart option. In our example we show you the restartable one:
  10. The I2P Service window shows up for them. Here they wait a little while for the program to fully start up.
  11. If all goes well, their computer launches their default browser, which could be Internet Explorer. While they do not want this, it is useful for getting the address to the I2P service. Thus they copy the address shown.
  12. They go to Opera and paste the address in the address bar. Then they drag the icon where it says “Web” to the bookmarks bar for easy navigation in the future.
  13. They wait a while as their I2P program becomes integrated into the worldwide network. They watch these two indicaters on the I2P homepage. Once they are green, they know they are good to go:
  14. Now, they click on the “Torrents” link at the top of the I2P Console.
  15. They are taken to I2PSnark, which is the built-in torrent client for I2P. Currently the client is empty since we haven’t added any torrents. They click on the “Postman” link to take them to the Postman tracker, which is the largest torrent tracker on I2P. There is also the Diftracker link, which is another tracker.
  16. Depending on how long the I2P program has been running, the Postman website will open immediately or after a while. They may also get a “Proxy server error” kind of page, which is nothing to be worried about, they will simply try the website again in 5-10 minutes.
    In the image it can be seen that the sneaky anonymous cyber pirates have uploaded torrents for a movie called Let the Right One In and a video game called Wasteland 2.
  17. Since we are perfectly law-abiding citizens, we will show an example of downloading a legal non-copyrighted file from the Postman I2P bittorrent tracker. But the pirates download movies and other files, committing copyrighted infringement. Of course, nobody, government or otherwise, can catch them do it, since everything is fully anonymous and encrypted. So they get away with downloading their favorite movies without making the super wealthy even wealthier. The communism!
    Here, to find a legal file, we put the keyword “pdf” into the search box so that we only see ebook files, some of which are copyright-free and legally distributable.
  18. Here is an example of some of the books that came up. We find some German magazine, a book by John Gray for clueless men trying to lead a politically correct life, two sex guides for autistic individuals, some convoluted self help nonsense, and a book for antenna nerds. These are all copyrighted books, therefore we will have to skip them; we wouldn’t download a car, so why would we download books? Of course, balaclava-wearing cyber pirates do not skip them just because they are copyrighted, since they know the cyber police have no way of catching them, since they are using I2P.
  19. After a very, very long time, we find a book that seems copyright-free.
  20. Here, the pirates will right-click the magnet icon on the left of the book title and click “Copy Link Address”.
  21. Then, they will go back to I2PSnark, paste the link in the “From URL” box, then click “Add torrent”.
  22. Below we see that the torrent has been added to the list of torrents. The word “Magnet” ahead of all those numbers tells the pirate that the torrent file hasn’t been fetched yet (it usually takes a minute or two). Once it is, the name for the torrent will be shown.
  23. Below you can see the finished torrent being seeded. We have blacked out the names of the other torrents for undisclosed reasons. Seeding is also perfectly anonymous; therefore pirates often leave many torrents running in the seeding mode to help other pirates download things faster. Due to all of the cryptography that happens, downloading more than 5 torrents at the same time can cause significant CPU usage.