this post was submitted on 16 Apr 2025
103 points (98.1% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

60204 readers
948 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):

🏴‍☠️ Other communities

Torrenting/P2P:

Gaming:


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
 

Not sure if this fits here...

An OPSEC community would probably say no, so I probably don't need to ask in those communities. But I'm curious about a (digital) pirate's perspective on this issue...

I mean, the sources listed here are supposedly "safe" right? But honestly, how much would you trust these "safe" sources?

When doing sensitive tasks like banking or filing taxes, do you:

  • Use a different OS on the same machine? (Dualboot)
  • Or put the pirated content inside a virtual machine?
  • Or just use a completely separate computer?

And since PC is much different than a Smartphone:

  • Would the extra sandboxing on Smartphones make pirating games on a Smartphone much safer compared to on a PC? (Not that there are much mobile games worth playing, just curious)

(PC in this context referring to all personal computers, regardless of OS)

And last question:

  • Non-installed/non-executable files such as .mp4 .mkv .mp3 .pdf .epub, are mostly safe right? I mean, you are using another program to opening it, not executing a file, there aren't much attack vectors as long as the video player / ebook viewer is up to date right? (Or am I understanding it wrong?)
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 2 points 1 day ago (1 children)

When you're discussing your own OPSEC (Operational Security for those unaware), you have to evaluate and determine your personal threat profile. Generally speaking, you need to determine what risks you're willing to accept, what risks you're willing to mitigate, and what risks you will not tolerate. There's a whole field of IT dedicated to this but the general idea is for you to understand that there is no perfect solution and everything is a trade off.

There is an inherent risk to downloading pirated software, especially software that you use for private activities (e.g. finances, etc.). With today's landscape of mining crypto, I'd go so far as to say almost any pirated software is at risk of this.

I would agree that generally playing media files is relatively low risk (though there was a vulnerability I read about a few years back of a zip-type attack. The details allude me at the moment).

But for executables, you basically have two options:

  • spin up a VM to host your executable, sandboxing it from everything else.
  • trust the people who are providing the executable and run it on your computer

Personally, I avoid pirated executables. More often than not I can find a similar open source product that I can download. My risk tolerance is not only low, but I don't see the benefits of using a particular company's software especially if an open source is available.

[–] [email protected] 1 points 18 hours ago

You can also use a dedicated system for pirated games. My wife knows if I'm playing a legit game based on which computer I'm using. 😅

[–] [email protected] 2 points 3 days ago

I dont run non free software. All games are in emulators or i buy them on steam or get them free on epic and play via heroic.

Any ebooks or pdfs are scanned on virus total and one positive result is enough to get deleted. I also only read them on an old tablet and old kindle both from around 2011/12 with networking disabled. They are only used for this purpose.

[–] [email protected] 1 points 3 days ago

Let's not be fooled by memes and buzz. Crackers don't crack it to infect your computer and make money. They do it to le t others play the game. They benefit by getting to play some other game someone else has cracked and distributing. And maybe they enjoy it as it's challenging. Cracking isn't about infecting people's computers. When some pirated game comes with some ransomware or trojan injected, probably it's been done by someone else whose passion is totally different than that of the cracker. They take the crack, modify it and then redistribute it malware injected. So, maybe, by downloading popular torrents, I mean if you make sure it comes directly from the cracker group, you can avoid malware except the spyware the game manufacturer has put into it, of course.

[–] [email protected] 9 points 4 days ago

Strangely enough I’ve found that some kid in India or Russia distributing his crack doesn’t do it to control my PC or to infect it.

Big corporations that install root kits or use hyper invasive cheat software (even when no competitive mode even exists) are far more insidious and untrustworthy.

I worry more about the hidden telemetry of big apps more than some crack being infected. Hell even MS virus scan will throw up false flags because the software just isn’t a registered dev or will quarantine an exe in error (libremonitor for example).

[–] [email protected] 7 points 4 days ago* (last edited 4 days ago)

yes. pirated software is suprisingly secure most of the time.

im also not running windows. malware not meant for proton is gonna have a bad time working.

[–] [email protected] 3 points 4 days ago* (last edited 4 days ago)

I mean, I pirated the Windows 10 installation on my gaming PC. Massgrave scripts helped out though, so there's that.

That said, I'm wiping Windows soon and installing LMDE. It's the last Windows PC in my house (minus W11 work laptop - that doesn't count though).

[–] [email protected] 2 points 5 days ago

I don't consider anything with Windows safe. I do all of my non-gaming computing on my laptop with Linux.

[–] [email protected] 23 points 5 days ago (1 children)

When engaging in criminal activity, you have no "legal" recourse for malicious behavior, so you work on the web of trust instead.

If you can't trust the software, nor the publisher, nor the hash verified by however many seeders, then don't download it in the first place. Me personally, considering I install indie porn games on the regular and never once gotten a virus that I know of, I think it's worth it to trust others.

Of course you could always go into paranoid zero trust mode but sometimes being a social being means trusting the criminal serving you free shit isn't ratfucking your data

[–] [email protected] 3 points 3 days ago

Instead the one that actually ratfucks my data is the game manufacturer that I've paid $100 for the game.

[–] [email protected] 7 points 5 days ago (1 children)

My tax machine is a VM. On another server (proxmox)

[–] [email protected] 3 points 4 days ago (1 children)

You do your taxes on a VM? FreetaxUSA works just fine on Linux.

[–] [email protected] 7 points 4 days ago* (last edited 4 days ago) (1 children)

Why is it always like this...

Not everything and everyone is in the US.

I also prefer Windows to Linux in the desktop environment. As for my server tasks, I mostly prefer Debian and if needed I'll use Windows Server (obviously unlicensed/not activated).
I'll use what fits for the task. :)

Edit: Also not a bad thing to separate a machine that holds sensitive data (even if they are encrypted) from another with a higher risk rating. Even if it's Linux, Mac OS, Unix or whatever based.

[–] [email protected] 4 points 4 days ago* (last edited 4 days ago) (1 children)

My mistake. The concept of "doing taxes" is usually US-specific, I don't really hear about that kind of thing from users in other, more civilized countries.

Genuinely curious though... Why use a VM for taxes?

[–] [email protected] 3 points 4 days ago

No worries.
As for your questions:
In Germany we can optionally file taxes. If we were overtaxed, we can claim the overcharged amount back.
As for why not on my main PC: I don't want that kind of software clogging up my main rig. Also helps keeping my digital mess a bit more organized ;)

[–] [email protected] 10 points 5 days ago

I personally run all my games in Bottles (flatpak) with sandboxing on. Even if a game is available for Linux I still run the Windows version inside Bottles just so it's slightly safer.

[–] [email protected] 5 points 5 days ago* (last edited 5 days ago)

I'm running the games in Linux, using Lutris as a launcher with a default configuration that wraps them in a firejail sandbox (for anybody interested, you add firejail as the "command prefix" under Global Options or in the System Options of the game) which amongst other things blocks networking.

In fact I went and figure out how to do all that exactly because I wanted to run pirated games in Linux in a safe way and you can't just rely on the lower probability of Windows games of having code that tries to determine if it's being run with Wine and accesses Linux-specific functionality and files if it is.

PS: That firejail stuff also works for Linux native games (it just wraps whatever you're running to start the game, be it Wine or directly the game Linux binary).

[–] [email protected] 12 points 5 days ago (1 children)

the games I pirate are all in my Lutris app which I installed as a flatpak on Linux, so they don't have the necessary permissions to change important files.

also I install them in the virtual C: drive, and they normally shouldn't thouch the virtual Z: drive. I don't think a hack would do that because installing malware on the windows drive should be enough for most people pirating games

[–] [email protected] 2 points 4 days ago

Thanks for the new rabbit hole 😂

[–] [email protected] 11 points 6 days ago

No, I try to treat that machine like a quarantine zone, I have a two PC setup and that's part of the reason for it. So basically I don't log into online accounts on that one (except relatively unimportant accounts for convenience, like Steam), and I don't do important stuff on it

[–] [email protected] 8 points 6 days ago

pdf files can contain javascript code that can run when it is opened. but when using complex formats (I think almost all video files, pdfs), it can happen that the software that understands it makes mistakes when reading it and making sense of it, and an attacker tries to make use of this to trick your software into doing something that wasn't intended by its creator. this is how it can happen that an mp4 file (or mkv, others, ...) cannot contain executable code (according to specification), and yet it can

in the case of pdf files, bundled fonts may be another source of problems

[–] [email protected] 7 points 6 days ago* (last edited 6 days ago) (1 children)

I'm on Linux, using Bottles to run pirated games. It adds a little bit of sandboxing, compatdata is usually a weird environment for malware to effectively work in (unless the malware is written specifically for it), if the game is really sketchy then I'd just disable network access for bottles flatpak too just to make sure.

All in all, I do sometimes have a little bit of paranoia and look through processes to see if there's anything running and periodically go through some folders to see if there's anything weird or unusual there, I'd still consider my machine to be safe.

As for the last question, PDF's are an attack vector and should be used with caution. As for other file types, it depends on the software you use to run them - if it's something pretty barebones that just plays it then it's usually fine, but if its something more complex and reads some custom data embeded into those files, then it can be a vulnerability. Not a security expert though, but it's the gist I got from looking at some historical vulnerabilities.

[–] [email protected] 5 points 6 days ago

First thing a malware would do is to replace top/ps and related utilities, to mask itself. Or directly replace kernel calls. You will not notice by just checking running processes

[–] [email protected] 10 points 6 days ago* (last edited 6 days ago)

I run such games on Linux now, mostly with wine/proton. There is some risk, sure, but I'd largely say that system is still secure. If something comes by and wipes out the system, I have snapshots of anything important, including root and home. If those are gone, I have versioned backups offsite and maybe offline. I don't expect to receive any malware targeting my somewhat esoteric software choices from windows games, so I feel okay logging into a secure sevice, for example, but I may have to adjust this in the future.

With regards to smartphones, I think there are so many holes that it's not much more secure, if any, than a paranoid desktop setup. From time to time I have installed random APKs and had extreme anxiety each time. I am massively more paranoid about my phone as I don't have real control over what's running on it. Hoping for more competitive open source solutions in the future.

Generally speaking, opening non-executable files is fine. There are and have been specific exploits which allow arbitrary code execution, but it's dependent on the application/library loading them. The bigger danger is files disguised as other things. This is especially bad on Windows as it likes to hide that information from users, or just execute random embedded vbscripts, or whatever. Also see the recent whatsapp mimetype bug/exploit. Certain things pose more of a risk than others. PDFs (thanks adobe) can embed arbitrary javascript which is meant to be executed. Same as web pages, of course, but browsers have a lot more attention to sandboxing.

Edit: I don't really run cracked software anymore, but I have VMs ready to go if need be. Would recommend others do the same.

[–] [email protected] 4 points 6 days ago (1 children)

Any questionable software I have is coming up on 4 years old now, most of it is older than that. I move them to a new machine every time I upgrade, simply because I don't trust torrents anymore.

Honestly, I don't trust PDFs anymore unless they're from places I know are "safe" which kind of sucks because I've been getting back into RC as a hobby and it's hard to find non-pdf plans. I prefer vector files, but I'm having to try my luck with jpg and png files.

A lot of the programs I used to use have been surpassed by current FOSS projects, and I've been replacing them as I can. Finding an open source laser engraver program that isn't shit is proving difficult.

[–] [email protected] 2 points 4 days ago (1 children)

Most PDF attacks target Adobe Acrobat and Reader. A few probably target Foxit or other minor players. If your PDF reader doesn't support stuff like macros, you're probably safe.

You might also be able to use something like ghostscript to manipulate PDFs and strip the fancy features.

[–] [email protected] 2 points 4 days ago

Ah. Well that's a relief, I removed foxit, and never had anything Adobe.

I open the pdfs in inkscape to pull the vector files and save them as an svg. There's probably a simpler way, but this allows me to open the vector in a lot more programs like my laser software and my CAD programs.

The only pdfs that get printed like a normal person are small rc planes and the files are from trusted sources.

It's nice to know I can do a little extra to protect myself from pdf based attacks though, thanks for the info!

[–] [email protected] 6 points 6 days ago

An OPSEC community would probably say no, so I probably don’t need to ask in those communities. But I’m curious about a (digital) pirate’s perspective on this issue…

Still committing OPSEC crimes, but I'm not as bad as I could be :P

I mean, the sources listed here are supposedly “safe” right? But honestly, how much would you trust these “safe” sources?

I think we're talking about different sets of standards. Even with that in mind, my own "trusted" list is a much smaller handful of any list posted online. Trust in pirate spaces shouldn't mean at face value and should be constantly tested with stuff like virustotal. It just means I haven't been compromised or seen anyone else report back with an infection for a long stretch of time on a specific website. There's always occasional breaches as malware enthusiasts test the waters now and then, usually not with a big/popular release. Stuff that could fly under the radar. Usually it comes down to whether or not that website has an active comment section or forum with active mods/admins who stamp it out continuously. I tend to prefer traditional bulletin board forums. rutracker.org or cs.rin.ru. I still don't touch any file right away. I let other people be the "brave" lab rats. See if any squeal first. I tend to avoid niche application piracy entirely. Those seem (and have been in my youth) to be the virus hotbeds cracked by total unknown entities. Plus I don't mind paying for independent / small company niche software. Often enough in those cases I can find a free open source alternative anyways.

It's worked out so far. I haven't been compromised in my adult years. But this isn't some "do as I do" thing, it's basically internet street smarts. Comes with experience and infections. I minimize risk and can trust my gut now, but I acknowledge it'll never be risk free.

When doing sensitive tasks like banking or filing taxes, do you:

>Use a different OS on the same machine? (Dualboot)
>Or put the pirated content inside a virtual machine?
>Or just use a completely separate computer?

Separate computer. An otherwise useless old laptop running Fedora. OPSEC would probably say it's not good enough because it's on the same network as computers which installed pirated software.

And since PC is much different than a Smartphone:

Would the extra sandboxing on Smartphones make pirating games on a Smartphone much safer compared to on a PC? (Not that there are much mobile games worth playing, just curious)

GrapheneOS here which does sandbox better than most, but I don't use my smartphone for anything sensitive. That's really without trying to, it's just not something I ever felt the need to use a smartphone for. I'm not as familiar with Android/Linux as I am with Windows. I know exactly where to periodically check for telltale signs of infection on Windows. I can still bend that OS to my will even as it gets worse for most end users. I'm less sure of myself on anything else. Working on that, HTPC is Fedora KDE spin now. Like you say, not much mobile games to play. I think I've bought like...3 ever. So, never felt much need to sideload. I usually stick to F-Droid and NDS emulators anyways. I have a Picross / Picross 3D addiction.

Non-installed/non-executable files such as .mp4 .mkv .mp3 .pdf .epub, are mostly safe right? I mean, you are using another program to opening it, not executing a file, there aren’t much attack vectors as long as the video player / ebook viewer is up to date right? (Or am I understanding it wrong?)

Usually, but sometimes there can be a flaw in a specific application exploited. I don't think I know of any from media formats outside of maliciously edited ROM files smc or v/z64 for cartridge based system emulators like extremely outdated ZSNES or Project64 1.6 specifically.

[–] [email protected] 9 points 6 days ago (1 children)

Clean copies of GOG games can be hash-checked. The only pirated games I really fuck with are GOG.

Although I wouldn't be too worried even if I did because I'm in Linux, and anything I did would be sandboxed and closed off from the rest of the system since it's running in a compatibility layer.

[–] [email protected] 21 points 6 days ago (1 children)

A compatibility layer like Wine is not a replacement for a true sandbox. Although Wine may have some basic sandboxing capabilities, the default wine configuration grants access to your home directory, which something like ransomware could take advantage of.

[–] [email protected] 5 points 6 days ago (1 children)

and even if you remove the Z: drive letter, in my understanding the software can still access your filesystem if it was prepared to call linux specific kernel functions, or if it has a copy of its own glibc or musl and is prepared to use it

[–] [email protected] 1 points 5 days ago (2 children)

Is that still the case if you use it in a flatpak e.g., Bottles?

[–] [email protected] 5 points 5 days ago* (last edited 5 days ago)

You can configure launchers such as Lutris to run your games inside a proper sandboxing application such as "firejail".

Just look into "Command Prefix" under Global Options in Lutris: a sandboxing app like firejail is used by really just running the sandbox app with the original command as a parameter of it, so that means you "prefix" the original command with the sandbox app and its parameters.

You can go as crazy as you want if you do sandboxing like that (down to only allowing access to whitelisted directories). In my case I've actually limited networking inside the sandbox to localhost-only.

[–] [email protected] 3 points 5 days ago* (last edited 5 days ago)

that should patch it up, mostly. flatpak gives real isolation. It's not 100% though, things can leak, like I think X11 access is unlimited, so wine programs can read other window contents, capture and inject keystrokes and mouse events if they are prepared to do it. but wayland windows they can't see or even know if they are open. but they may still be able to mess with your bottles config and other things installed for the bottles flatpak container

[–] [email protected] 35 points 6 days ago (1 children)

Publisher matters. Some random website advertising a disk cleaning utility could be malware while a Fitgirl repack most definitely isn’t. Installing something from an official Ubuntu software repository is also pretty safe, while something from a 3rd party repository or community development library could be malware. I also generally trust PDFs from Anna’s Archive and Libgen or Internet Archive, because of the reputation loss to them if it were. You can minimize your risk to a tolerable level this way.

[–] [email protected] 1 points 5 days ago (1 children)
[–] [email protected] 1 points 5 days ago

If memory serves, Anna's links to them if you check their "3rd party sources" links when doing an ISBN search.

[–] [email protected] 6 points 6 days ago (1 children)

Seems like most pirated software does a good job of trying to cut software off from internet communication so that it doesn't get sniffed out on an add-on or update query. I don't trust most software companies anymore as far as security goes either. So the short answer is at least personally, after scanning everything before and after installation and check network monitor for anything that looks weird while running, yes I consider my system secure still.

Curious what "safe" list you are referring to?

load more comments
view more: next ›