this post was submitted on 03 Aug 2023
80 points (100.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

1444 readers
8 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don't know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

you are viewing a single comment's thread
view the rest of the comments
[–] ProcurementCat@feddit.de 5 points 1 year ago (1 children)

You can always run software in a Virtual Machine to see if it's the real deal or not. Additionally, people really like to be "the first" or "the one" who actually provides something. See for example the first cracked Version of Read Dead Redemption 2 - it was announced like a special record (and it was!). Being the first to provide an actual, working copy brings fame, that's why people go to such lengths to crack and provide software. And the people who download it? Well, they can often rely on those with virtual machines testing the software and then on reviews and ratings available on the download sites.

[–] r3nder 3 points 1 year ago* (last edited 1 year ago)

Virtual machine testing is a good idea, but I wouldn't rely on it. Well written malware will check for a virtual environment and might even hold off executing if it detects it. Better malware will have already gained persistence as your testing for it.