Skip Navigation

Do y'all still consider the machine you run pirated software/games on to still be "Secure"?

Not sure if this fits here...

An OPSEC community would probably say no, so I probably don't need to ask in those communities. But I'm curious about a (digital) pirate's perspective on this issue...

I mean, the sources listed here are supposedly "safe" right? But honestly, how much would you trust these "safe" sources?

When doing sensitive tasks like banking or filing taxes, do you:

  • Use a different OS on the same machine? (Dualboot)
  • Or put the pirated content inside a virtual machine?
  • Or just use a completely separate computer?

And since PC is much different than a Smartphone:

  • Would the extra sandboxing on Smartphones make pirating games on a Smartphone much safer compared to on a PC? (Not that there are much mobile games worth playing, just curious)

(PC in this context referring to all personal computers, regardless of OS)

And last question:

  • Non-installed/non-executable files such as .mp4 .mkv .mp3 .pdf .epub, are mostly safe right? I mean, you are using another program to opening it, not executing a file, there aren't much attack vectors as long as the video player / ebook viewer is up to date right? (Or am I understanding it wrong?)
50 comments
  • When engaging in criminal activity, you have no "legal" recourse for malicious behavior, so you work on the web of trust instead.

    If you can't trust the software, nor the publisher, nor the hash verified by however many seeders, then don't download it in the first place. Me personally, considering I install indie porn games on the regular and never once gotten a virus that I know of, I think it's worth it to trust others.

    Of course you could always go into paranoid zero trust mode but sometimes being a social being means trusting the criminal serving you free shit isn't ratfucking your data

    • Instead the one that actually ratfucks my data is the game manufacturer that I've paid $100 for the game.

  • No, I try to treat that machine like a quarantine zone, I have a two PC setup and that's part of the reason for it. So basically I don't log into online accounts on that one (except relatively unimportant accounts for convenience, like Steam), and I don't do important stuff on it

  • I run such games on Linux now, mostly with wine/proton. There is some risk, sure, but I'd largely say that system is still secure. If something comes by and wipes out the system, I have snapshots of anything important, including root and home. If those are gone, I have versioned backups offsite and maybe offline. I don't expect to receive any malware targeting my somewhat esoteric software choices from windows games, so I feel okay logging into a secure sevice, for example, but I may have to adjust this in the future.

    With regards to smartphones, I think there are so many holes that it's not much more secure, if any, than a paranoid desktop setup. From time to time I have installed random APKs and had extreme anxiety each time. I am massively more paranoid about my phone as I don't have real control over what's running on it. Hoping for more competitive open source solutions in the future.

    Generally speaking, opening non-executable files is fine. There are and have been specific exploits which allow arbitrary code execution, but it's dependent on the application/library loading them. The bigger danger is files disguised as other things. This is especially bad on Windows as it likes to hide that information from users, or just execute random embedded vbscripts, or whatever. Also see the recent whatsapp mimetype bug/exploit. Certain things pose more of a risk than others. PDFs (thanks adobe) can embed arbitrary javascript which is meant to be executed. Same as web pages, of course, but browsers have a lot more attention to sandboxing.

    Edit: I don't really run cracked software anymore, but I have VMs ready to go if need be. Would recommend others do the same.

  • Strangely enough I’ve found that some kid in India or Russia distributing his crack doesn’t do it to control my PC or to infect it.

    Big corporations that install root kits or use hyper invasive cheat software (even when no competitive mode even exists) are far more insidious and untrustworthy.

    I worry more about the hidden telemetry of big apps more than some crack being infected. Hell even MS virus scan will throw up false flags because the software just isn’t a registered dev or will quarantine an exe in error (libremonitor for example).

  • yes. pirated software is suprisingly secure most of the time.

    im also not running windows. malware not meant for proton is gonna have a bad time working.

  • An OPSEC community would probably say no, so I probably don’t need to ask in those communities. But I’m curious about a (digital) pirate’s perspective on this issue…

    Still committing OPSEC crimes, but I'm not as bad as I could be :P

    I mean, the sources listed here are supposedly “safe” right? But honestly, how much would you trust these “safe” sources?

    I think we're talking about different sets of standards. Even with that in mind, my own "trusted" list is a much smaller handful of any list posted online. Trust in pirate spaces shouldn't mean at face value and should be constantly tested with stuff like virustotal. It just means I haven't been compromised or seen anyone else report back with an infection for a long stretch of time on a specific website. There's always occasional breaches as malware enthusiasts test the waters now and then, usually not with a big/popular release. Stuff that could fly under the radar. Usually it comes down to whether or not that website has an active comment section or forum with active mods/admins who stamp it out continuously. I tend to prefer traditional bulletin board forums. rutracker.org or cs.rin.ru. I still don't touch any file right away. I let other people be the "brave" lab rats. See if any squeal first. I tend to avoid niche application piracy entirely. Those seem (and have been in my youth) to be the virus hotbeds cracked by total unknown entities. Plus I don't mind paying for independent / small company niche software. Often enough in those cases I can find a free open source alternative anyways.

    It's worked out so far. I haven't been compromised in my adult years. But this isn't some "do as I do" thing, it's basically internet street smarts. Comes with experience and infections. I minimize risk and can trust my gut now, but I acknowledge it'll never be risk free.

    When doing sensitive tasks like banking or filing taxes, do you:

     
            >Use a different OS on the same machine? (Dualboot)
        >Or put the pirated content inside a virtual machine?
        >Or just use a completely separate computer?
    
    
      

    Separate computer. An otherwise useless old laptop running Fedora. OPSEC would probably say it's not good enough because it's on the same network as computers which installed pirated software.

    And since PC is much different than a Smartphone:

    Would the extra sandboxing on Smartphones make pirating games on a Smartphone much safer compared to on a PC? (Not that there are much mobile games worth playing, just curious)

    GrapheneOS here which does sandbox better than most, but I don't use my smartphone for anything sensitive. That's really without trying to, it's just not something I ever felt the need to use a smartphone for. I'm not as familiar with Android/Linux as I am with Windows. I know exactly where to periodically check for telltale signs of infection on Windows. I can still bend that OS to my will even as it gets worse for most end users. I'm less sure of myself on anything else. Working on that, HTPC is Fedora KDE spin now. Like you say, not much mobile games to play. I think I've bought like...3 ever. So, never felt much need to sideload. I usually stick to F-Droid and NDS emulators anyways. I have a Picross / Picross 3D addiction.

    Non-installed/non-executable files such as .mp4 .mkv .mp3 .pdf .epub, are mostly safe right? I mean, you are using another program to opening it, not executing a file, there aren’t much attack vectors as long as the video player / ebook viewer is up to date right? (Or am I understanding it wrong?)

    Usually, but sometimes there can be a flaw in a specific application exploited. I don't think I know of any from media formats outside of maliciously edited ROM files smc or v/z64 for cartridge based system emulators like extremely outdated ZSNES or Project64 1.6 specifically.

  • Any questionable software I have is coming up on 4 years old now, most of it is older than that. I move them to a new machine every time I upgrade, simply because I don't trust torrents anymore.

    Honestly, I don't trust PDFs anymore unless they're from places I know are "safe" which kind of sucks because I've been getting back into RC as a hobby and it's hard to find non-pdf plans. I prefer vector files, but I'm having to try my luck with jpg and png files.

    A lot of the programs I used to use have been surpassed by current FOSS projects, and I've been replacing them as I can. Finding an open source laser engraver program that isn't shit is proving difficult.

  • Let's not be fooled by memes and buzz. Crackers don't crack it to infect your computer and make money. They do it to le t others play the game. They benefit by getting to play some other game someone else has cracked and distributing. And maybe they enjoy it as it's challenging. Cracking isn't about infecting people's computers. When some pirated game comes with some ransomware or trojan injected, probably it's been done by someone else whose passion is totally different than that of the cracker. They take the crack, modify it and then redistribute it malware injected. So, maybe, by downloading popular torrents, I mean if you make sure it comes directly from the cracker group, you can avoid malware except the spyware the game manufacturer has put into it, of course.

50 comments