this post was submitted on 03 Aug 2023
101 points (83.9% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

53435 readers
682 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


founded 1 year ago
MODERATORS
 

I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don't know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 139 points 1 year ago (1 children)

Worth noting that paying for a license for software doesn't stop it being spying malware either. In fact the pirate versions often take out the spying and the reporting-to-homebase that proprietary software does.

The photoshop that phones home to check a license is arguably more malicious than the pirate version that has been cracked so it doesn't do that.

[–] [email protected] 14 points 1 year ago (1 children)

Good and valid point. I use opensource software wherever I can.

Though paid software is not going to encrypt your data for ransom or use a keylogger to steal bitcoin (yet).

[–] [email protected] 6 points 1 year ago (2 children)

There was an antivirus that was caught running a bitcoin miner in the background tbf. If memory serves it was Norton?

load more comments (2 replies)
[–] [email protected] 97 points 1 year ago* (last edited 1 year ago) (14 children)

Long story short.

  1. Be prepared for disaster.
  2. Scan it. Sandbox it if concerned.
  3. Firewall inspect/block/allow every outbound comm.
  4. Get it from a trusted source.

Basically the same stuff you should be doing with all software.

Edit for firewall clarification.

load more comments (14 replies)
[–] [email protected] 69 points 1 year ago (1 children)

I trust pirates more than billion or trillion dollar companies. Also, aggressive DRM such as iLok is worse than malware, so eh.

[–] [email protected] 19 points 1 year ago

Fuck iLok. Shit made me regret buying plugins, should have stuck with piracy.

[–] [email protected] 43 points 1 year ago (5 children)

It's partly an honor system but also, anyone distributing malicious cracks are quickly called out whether its on public tracker comments like PirateBay or removed from private trackers.

Distributors of GOOD and CLEAN cracks often earn good rep in the community too, like Monkrus which I've had no issue with before.

Also, in my experience, installing a malware-packaged adobe app isn't actually all that bad if you run a malware scan immediately afterwards. With the scale and breadth of software piracy there isn't much money in making advanced malwares beyond bundling an existing one into an installer. I don't recommend it, but it's still easier and cheaper than paying Adobe!

TLDR the community polices itself pretty well considering.

[–] [email protected] 14 points 1 year ago (1 children)

Also, I would consider some legitimate licenced software more of a malware than a cracked one. If your software forces always-online license, comes with annoying startup processes, nagging ad screens, etc, it's malware. And if there's a cracked version without those things, I'll take the cracked version any day.

load more comments (1 replies)
load more comments (4 replies)
[–] [email protected] 40 points 1 year ago

You're thinking too technical about this. This is a money thing. Personally speaking pirated software/games were chicken soup for my poverty ridden childhood.

[–] [email protected] 39 points 1 year ago (2 children)

If i were to pay for an AutoCAD license , it would be over 200$ A MONTH

[–] [email protected] 15 points 1 year ago (2 children)

What kind of cheap-ass, stripped down AutoDesk suite are you getting for $200/mo. Last I checked, the architectural suite was north of $4500/yr.

[–] [email protected] 12 points 1 year ago (1 children)
load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 13 points 1 year ago (3 children)

That's why I'm learning Blender, I think I'll be able to carry on without Maya.

Adobe isn't pretty but Autodesk is a scourge

[–] [email protected] 5 points 1 year ago

I Love blender. I am also learning it but more because it works on linux unlike AutoCAD

load more comments (1 replies)
[–] [email protected] 32 points 1 year ago (1 children)

If you get the software from reliable source, it is almost certain it does not have malware.

The piracy is an organized activity and people at higher rank nuke the release if it has malware.

Read more here https://opentrackers.org/i/2600_Guide_to_Internet_Piracy-TYDJ.txt

load more comments (1 replies)
[–] [email protected] 25 points 1 year ago* (last edited 1 year ago)

How come people are willing to download and install pirated software though?

You can just remove "priated" from that statement and come to the same conclusions. Considering the amount of bugs, backdoors and 0-day exploits distributed via official software I sometimes wonder why people execute proprietary, closed source programs at all.

An no, "reputable" companies mean nothing, just look at Microsoft clowning around with their signing keys.

[–] [email protected] 24 points 1 year ago

You severely underestimate the power of free stuff

[–] [email protected] 24 points 1 year ago (3 children)

i mean you could always sandbox it

[–] [email protected] 6 points 1 year ago

Sandboxie-plus for the win! Saved my sanity several times.

load more comments (2 replies)
[–] [email protected] 22 points 1 year ago (8 children)

really theres little reason to even use non-foss paid software....

[–] [email protected] 9 points 1 year ago

I wish that was true

[–] [email protected] 8 points 1 year ago
[–] [email protected] 8 points 1 year ago

There a reason if the alternative doesn't exist or isnt good enough.

[–] [email protected] 5 points 1 year ago (2 children)

Exactly. Piracy extends the commercial ecosystem. Every software pirate is a potential user and contributor of FOSS projects who is instead spending their time and talents working on/with commercial offerings.

To a distributor of commercial software, a pirate user is preferable to a user of a competing product. The competing user is already locked into the competition's product line; the pirate is expanding your own product line's market share.

Below the competing user is the FOSS user: it is much easier to monetize a pirate user who likes the system enough to steal it, or a competing user who has demonstrated they are willing to throw money at their problems. FOSS users aren't willing to tolerate all the artificial limitations imposed on the product to increase profitability.

I have no moral or ethical qualms with piracy as a general concept, but software piracy inherently promotes commercial alternatives at the expense of FOSS products. The only software I have pirated in decades has been rare, niche software for very specific uses.

load more comments (2 replies)
load more comments (4 replies)
[–] [email protected] 20 points 1 year ago (1 children)

Your assumption is wrong mail can contain executables. Picture can hold executable instructions and so do videos. For example videos and pictures in mail can contain virus. You are not safe just because you download movies and pictures

[–] [email protected] 8 points 1 year ago (2 children)

Can you explain how can a picture holds a executable in it? Also you have to make the file executable to run it. Something like chmod +x random.mp4

[–] [email protected] 16 points 1 year ago (1 children)

You are thinking it wrong about malware in pictures. They don’t act like an executable rather then injecting instructions to an executable program you are opening your picture in. In that case you don’t need the +x flag on your file. Think of it as a Trojan horse

https://gizmodo.com/malware-images-virus-photos-pictures-how-block-antiviru-1849572516 If you are more interested

[–] [email protected] 12 points 1 year ago (3 children)

I think it is very rare to find or even craft a video file that is able to allow for arbitrary code execution on an updated video player software like VLC. The same is true for photos or documents with the exception of office documents using macros.

load more comments (3 replies)
load more comments (1 replies)
[–] [email protected] 20 points 1 year ago* (last edited 1 year ago)

I feel safe, maybe I shouldnt, but my life wouldnt be this good if I didnt have access to everything I cracked lol

[–] [email protected] 19 points 1 year ago (2 children)

Meh, how is surgery a thing? You let people just open you up and dig around your insides?

it's a mix of need and belief in a proper vetting process. For computers there's the additional layer that any one machine is probably low stakes. In early internet days most software was prohibitively expensive but gave you the equivalent of super powers - as a teenager / young adult with ability to take that risk you're not going to do it?

load more comments (2 replies)
[–] [email protected] 16 points 1 year ago (1 children)

If I get malware, I can just go reinstall my OS. If I pay for software, I'm never getting that money back.

[–] [email protected] 5 points 1 year ago (3 children)

If you notice the malware..

[–] [email protected] 6 points 1 year ago (5 children)

And have something worth loosing on gheir PC. Many professional software users using cracks may worry of losing their work files which could be easily backed up.

As long as they dont have their financials or personal information thats worth stealing, the cost saving of the pirated software is worth infection, which at max needs a fresh install.

load more comments (5 replies)
load more comments (2 replies)
[–] [email protected] 15 points 1 year ago

I installed trusted cracks from scene groups. Not everyone who can crack will be a scene group. To get into the scene you need to be well trusted. Scene groups would NOT damage their integrity to install something malicious through a crack

As another user said, check the files you have match the direct uploads from the scene with a site like predb.me

You can search online for more info on scene groups/warez/topsites

[–] [email protected] 11 points 1 year ago (1 children)

Denuvo games performed worse than the cracked version, FYI.

load more comments (1 replies)
[–] [email protected] 11 points 1 year ago

when you dl from any seller site do you know what you get regarding spy/mal/bloatware? for sure?

i would not dl from usenet or a public tracker though.

[–] [email protected] 10 points 1 year ago

Most don't invest that much into anti-piracy protection and you can avoid it with simple firewall and GPEdit corrections for the unlimited premium spoof.

There are also the key gens that emulates the server or the software to receive the codes or give a confirmation to the software.

This is all very oversimplified and there are an infinite number of anti-piracy methods that the companies don't even want to try to solve since it's all free advertising and it gets people used to their software when they have to buy it.

[–] [email protected] 9 points 1 year ago

it is the same as any binary. you do not know what the author has baked it.

[–] [email protected] 7 points 1 year ago (4 children)

It's one of those high-risk, high-returns case scenarios. You gamble. If you succeed, you will be saving some buck. Some software licences can be very, very expensive.

There is no way of knowing the answer to your questions. You just use your intuition and take a leap of faith.

load more comments (4 replies)
[–] [email protected] 5 points 1 year ago
load more comments
view more: next ›