I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don’t know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

  • @[email protected]
    link
    fedilink
    English
    662 years ago

    Worth noting that paying for a license for software doesn’t stop it being spying malware either. In fact the pirate versions often take out the spying and the reporting-to-homebase that proprietary software does.

    The photoshop that phones home to check a license is arguably more malicious than the pirate version that has been cracked so it doesn’t do that.

    • @[email protected]OP
      link
      fedilink
      English
      02 years ago

      Good and valid point. I use opensource software wherever I can.

      Though paid software is not going to encrypt your data for ransom or use a keylogger to steal bitcoin (yet).

      • @[email protected]
        link
        fedilink
        English
        22 years ago

        There was an antivirus that was caught running a bitcoin miner in the background tbf. If memory serves it was Norton?

  • b1ab
    link
    fedilink
    English
    61
    edit-2
    2 years ago

    Long story short.

    1. Be prepared for disaster.
    2. Scan it. Sandbox it if concerned.
    3. Firewall inspect/block/allow every outbound comm.
    4. Get it from a trusted source.

    Basically the same stuff you should be doing with all software.

    Edit for firewall clarification.

      • b1ab
        link
        fedilink
        English
        82 years ago

        I don’t.

        But I take many precautions.

        I’ve been pirating software since the C64. About 40 years. Never stopped. Never will.

        I buy the good software I encounter. As a developer, i know it’s important to keep funding further development. Unfortunately most is overpriced garbage.

        • @[email protected]
          link
          fedilink
          English
          22 years ago

          I’m pretty new and extremely cautious with pirated software, i still need to find the precautions i have to take, luckily pirating games is much safer and easier than pirating software

          • @[email protected]
            link
            fedilink
            English
            52 years ago

            Could you elaborate how pirating games is “safer” than pirating software? Both are executables that could run whatever code they wish on your system, and since pirated games are so desirable, in my experience they are far more often spread around bundled with malware than software is. Oftentimes, you’ll find people take legitimate repacks, add malware, then share the repack under the same repackers name.

            • @[email protected]
              link
              fedilink
              English
              12 years ago

              It feels safer as there are a few sites with a good reputation which is just easier to find which makes me feel safer. Idk if it is really safer than with software.

      • b1ab
        link
        fedilink
        English
        02 years ago

        I don’t really use Windows except for playing games, so someone else may have a better answer.

        For me, I want 3 types of protection, priority order.

        1. Rootkit and ransomware protection. Lock down and protect system files.

        2. Firewall. Stop software from calling home (and possibly invalidating my forged license) and to stop malware from reaching out to command and control systems.

        3. Malware scanning and suspect execution detection. Most antivirus software detections will be in only one of a couple categories: keygen, generic trojan, or obfuscated executable. If I encounter this, I go to VirusTotal.com and drop the offending file(s) for it to scan. If I’m still concerned I will use an online sandbox execution recorder that tells you what the exe does such as outbound comms, file modifications, registry read/writes, etc.

        Windows Defender accomplishes these requirements. Although it is a bit clunky and other mainstream antivirus (paid or free) accomplish the same in a much cleaner interface.

        I cannot stress enough the importance of downloading pirated software from a trusted source.

        • @[email protected]
          link
          fedilink
          English
          1
          edit-2
          2 years ago

          We are seeing on our corporate network lots of browser hikackers that connect to c&c and are used in botnet DDOS as a service. Once you install x software it sets up a persistent service that keeps modding chrome.exe etc

          Firewalling the .exe that you installed does nothing to stop the calls to c&c

          • b1ab
            link
            fedilink
            English
            02 years ago

            Fair point. Malware can tunnel through existing comms, thus firewalling the exe would do little to protect you.

            That’s why I recommended a multilayered defense and practicing good opsec.

            An exe that installs a service, modifies unrelated executables, and sends comms through an unrelated application would be a catastrophic failure in any good defense.

            If your system is this wide open then you’ll be likely to have all sorts of problems from non pirated software. Such as freeware that installs adware.

            I have tried to find these in the wild to no avail.

            • @[email protected]
              link
              fedilink
              English
              12 years ago

              Unfortunately the machines that get infected are not fully controlled by us but they get networking and internet from us (space rental in the building), so we isolate them as much as possible and we black hole all the bad traffic on the router level.

              Our machines all have EDR and strict security policies. Not much gets past that.

    • @[email protected]
      link
      fedilink
      02 years ago

      This. It feels more likely to get malware-infested downloads from no-name warez websites than trusted trackers.

  • darcy
    link
    fedilink
    English
    192 years ago

    really theres little reason to even use non-foss paid software…

    • @[email protected]
      link
      fedilink
      English
      02 years ago

      Exactly. Piracy extends the commercial ecosystem. Every software pirate is a potential user and contributor of FOSS projects who is instead spending their time and talents working on/with commercial offerings.

      To a distributor of commercial software, a pirate user is preferable to a user of a competing product. The competing user is already locked into the competition’s product line; the pirate is expanding your own product line’s market share.

      Below the competing user is the FOSS user: it is much easier to monetize a pirate user who likes the system enough to steal it, or a competing user who has demonstrated they are willing to throw money at their problems. FOSS users aren’t willing to tolerate all the artificial limitations imposed on the product to increase profitability.

      I have no moral or ethical qualms with piracy as a general concept, but software piracy inherently promotes commercial alternatives at the expense of FOSS products. The only software I have pirated in decades has been rare, niche software for very specific uses.

  • @[email protected]
    link
    fedilink
    English
    9
    edit-2
    2 years ago

    I feel safe, maybe I shouldnt, but my life wouldnt be this good if I didnt have access to everything I cracked lol

  • @[email protected]
    link
    fedilink
    English
    82 years ago

    Most don’t invest that much into anti-piracy protection and you can avoid it with simple firewall and GPEdit corrections for the unlimited premium spoof.

    There are also the key gens that emulates the server or the software to receive the codes or give a confirmation to the software.

    This is all very oversimplified and there are an infinite number of anti-piracy methods that the companies don’t even want to try to solve since it’s all free advertising and it gets people used to their software when they have to buy it.

  • SomeDude
    link
    fedilink
    English
    72 years ago

    You can always run software in a Virtual Machine to see if it’s the real deal or not. Additionally, people really like to be “the first” or “the one” who actually provides something. See for example the first cracked Version of Read Dead Redemption 2 - it was announced like a special record (and it was!). Being the first to provide an actual, working copy brings fame, that’s why people go to such lengths to crack and provide software. And the people who download it? Well, they can often rely on those with virtual machines testing the software and then on reviews and ratings available on the download sites.

    • itsYaBoyNoodles
      link
      fedilink
      English
      4
      edit-2
      2 years ago

      Virtual machine testing is a good idea, but I wouldn’t rely on it. Well written malware will check for a virtual environment and might even hold off executing if it detects it. Better malware will have already gained persistence as your testing for it.

  • @[email protected]
    link
    fedilink
    English
    62 years ago

    I installed trusted cracks from scene groups. Not everyone who can crack will be a scene group. To get into the scene you need to be well trusted. Scene groups would NOT damage their integrity to install something malicious through a crack

    As another user said, check the files you have match the direct uploads from the scene with a site like predb.me

    You can search online for more info on scene groups/warez/topsites

  • @[email protected]
    link
    fedilink
    English
    6
    edit-2
    2 years ago

    How come people are willing to download and install pirated software though?

    You can just remove “priated” from that statement and come to the same conclusions. Considering the amount of bugs, backdoors and 0-day exploits distributed via official software I sometimes wonder why people execute proprietary, closed source programs at all.

    An no, “reputable” companies mean nothing, just look at Microsoft clowning around with their signing keys.

  • @[email protected]
    link
    fedilink
    English
    5
    edit-2
    2 years ago

    Pro tip: if you do not trust the source. Do sfv verification. You can find the CRC of the ISO on trusted pre sites. (Like predb.me). Granted you need to trust the CRC on the Pre sites. The CRCs on the pre sites are the ones posted of the (ftp) scene groups. So if your shady torrent matches the scene CRC you are golden.

  • @[email protected]
    link
    fedilink
    English
    52 years ago

    It’s one of those high-risk, high-returns case scenarios. You gamble. If you succeed, you will be saving some buck. Some software licences can be very, very expensive.

    There is no way of knowing the answer to your questions. You just use your intuition and take a leap of faith.

    • dejalynn
      link
      fedilink
      2
      edit-2
      2 years ago

      Some software licences can be very, very expensive.

      When I was in art school in the early 2000’s, I worked with computer controlled weaving looms. The program for drafting patterns and running the AVL Compu Dobby on the loom was free to download. In order to use it, though, you had to have a $3000 usb key.

        • dejalynn
          link
          fedilink
          12 years ago

          The part that hurt was the ancient Mac II that ran the loom. When I encountered the Y2K bug on it, some upperclassmen said, “Oh we’ve just been turning the clock back a year.” Turned it back as far as it would go…1969

  • @[email protected]
    link
    fedilink
    English
    42 years ago

    If I get malware, I can just go reinstall my OS. If I pay for software, I’m never getting that money back.

  • 🐱TheCat
    link
    fedilink
    English
    42 years ago

    Meh, how is surgery a thing? You let people just open you up and dig around your insides?

    it’s a mix of need and belief in a proper vetting process. For computers there’s the additional layer that any one machine is probably low stakes. In early internet days most software was prohibitively expensive but gave you the equivalent of super powers - as a teenager / young adult with ability to take that risk you’re not going to do it?