It is not hard to verify the integrity of files tranferred over bittorrent. When you download a torrent from a big name company like Redhat, say a Fedora Linux iso, you can be assured that the torrent coming from them is clean. It also includes GPG signatures which you verify yourself. https://fedoraproject.org/en/verify Most of the information in those two links I have seen are what I call FUD. http://en.wikipedia.org/wiki/Fear,_uncertainty_and_doubt Bittorrent has been implemented in many ways, here are some examples of how bittorrent has been implemented. Some notable names being Facebook and Blizzard using it. http://www.makeuseof.com/tag/8-legal-uses-for-bittorrent-youd-be-surprised/ Downloading malware happens regardless of protocol. It does not have to be P2P. In fact I believe downloading malware through HTTP from websites is far more common.