Most servers use secure ports and manage connections and probes quite carefully. Even if an ISP took an interest and logged connection attempts to a certain address, they would be unlikely to extract the exact packets and prove key sharing via analysis.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.