Not sure if this fits here…

An OPSEC community would probably say no, so I probably don’t need to ask in those communities. But I’m curious about a (digital) pirate’s perspective on this issue…

I mean, the sources listed here are supposedly “safe” right? But honestly, how much would you trust these “safe” sources?

When doing sensitive tasks like banking or filing taxes, do you:

  • Use a different OS on the same machine? (Dualboot)
  • Or put the pirated content inside a virtual machine?
  • Or just use a completely separate computer?

And since PC is much different than a Smartphone:

  • Would the extra sandboxing on Smartphones make pirating games on a Smartphone much safer compared to on a PC? (Not that there are much mobile games worth playing, just curious)

(PC in this context referring to all personal computers, regardless of OS)

And last question:

  • Non-installed/non-executable files such as .mp4 .mkv .mp3 .pdf .epub, are mostly safe right? I mean, you are using another program to opening it, not executing a file, there aren’t much attack vectors as long as the video player / ebook viewer is up to date right? (Or am I understanding it wrong?)
  • ☂️-@lemmy.ml
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    14 hours ago

    yes. pirated software is suprisingly secure most of the time.

    im also not running windows. malware not meant for proton is gonna have a bad time working.

  • Aceticon@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    2 days ago

    I’m running the games in Linux, using Lutris as a launcher with a default configuration that wraps them in a firejail sandbox (for anybody interested, you add firejail as the “command prefix” under Global Options or in the System Options of the game) which amongst other things blocks networking.

    In fact I went and figure out how to do all that exactly because I wanted to run pirated games in Linux in a safe way and you can’t just rely on the lower probability of Windows games of having code that tries to determine if it’s being run with Wine and accesses Linux-specific functionality and files if it is.

    PS: That firejail stuff also works for Linux native games (it just wraps whatever you’re running to start the game, be it Wine or directly the game Linux binary).

  • liliumstar@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    10
    ·
    edit-2
    3 days ago

    I run such games on Linux now, mostly with wine/proton. There is some risk, sure, but I’d largely say that system is still secure. If something comes by and wipes out the system, I have snapshots of anything important, including root and home. If those are gone, I have versioned backups offsite and maybe offline. I don’t expect to receive any malware targeting my somewhat esoteric software choices from windows games, so I feel okay logging into a secure sevice, for example, but I may have to adjust this in the future.

    With regards to smartphones, I think there are so many holes that it’s not much more secure, if any, than a paranoid desktop setup. From time to time I have installed random APKs and had extreme anxiety each time. I am massively more paranoid about my phone as I don’t have real control over what’s running on it. Hoping for more competitive open source solutions in the future.

    Generally speaking, opening non-executable files is fine. There are and have been specific exploits which allow arbitrary code execution, but it’s dependent on the application/library loading them. The bigger danger is files disguised as other things. This is especially bad on Windows as it likes to hide that information from users, or just execute random embedded vbscripts, or whatever. Also see the recent whatsapp mimetype bug/exploit. Certain things pose more of a risk than others. PDFs (thanks adobe) can embed arbitrary javascript which is meant to be executed. Same as web pages, of course, but browsers have a lot more attention to sandboxing.

    Edit: I don’t really run cracked software anymore, but I have VMs ready to go if need be. Would recommend others do the same.

  • Commiunism@beehaw.org
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    3 days ago

    I’m on Linux, using Bottles to run pirated games. It adds a little bit of sandboxing, compatdata is usually a weird environment for malware to effectively work in (unless the malware is written specifically for it), if the game is really sketchy then I’d just disable network access for bottles flatpak too just to make sure.

    All in all, I do sometimes have a little bit of paranoia and look through processes to see if there’s anything running and periodically go through some folders to see if there’s anything weird or unusual there, I’d still consider my machine to be safe.

    As for the last question, PDF’s are an attack vector and should be used with caution. As for other file types, it depends on the software you use to run them - if it’s something pretty barebones that just plays it then it’s usually fine, but if its something more complex and reads some custom data embeded into those files, then it can be a vulnerability. Not a security expert though, but it’s the gist I got from looking at some historical vulnerabilities.

    • ancoraunamoka@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      2 days ago

      First thing a malware would do is to replace top/ps and related utilities, to mask itself. Or directly replace kernel calls. You will not notice by just checking running processes

  • maxprime@lemmy.ml
    link
    fedilink
    English
    arrow-up
    56
    arrow-down
    4
    ·
    3 days ago

    Honestly I don’t run pirated software at all anymore. The risk is too high. If it’s a game then I’m happy to pay for it, and open source software covers pretty much everything else for me.

    The only exception is switch games but they run through an emulator which is quite safe.

    Most media files are safe but I’ve heard that PDFs of all files can be vectors.

    • LeninOnAPrayer@lemm.ee
      link
      fedilink
      English
      arrow-up
      12
      ·
      edit-2
      2 days ago

      I hadn’t really thought about it until reading this comment but I am definitely the same. I use to pirate so much software back in the day. But, I really just find myself looking for projects on GitHub that fit my needs.

      I pirated a video upscaling program just to test it out. Topaz I think it was. But it was mostly just curiosity because it was very niche in it’s performance improvement over it’s open source alternative video2x.

      That’s literally the only software I can remember pirating in the last 10 years.

      If it’s good and requires a one time purchase. I buy it. Unraid is obviously going to be an example of that for a lot of people here.

      I think I’ve spent more money donating “coffee” to good open source projects though. And going windows free for over 3 years now has been a big part of that. I can’t stand when I have to use Windows now. Work still forces it on me. But I literally only use it to SSH into my redhat VM.

      All my piracy is media these days. And that’s only because the streaming services have basically reached the point that cable did back in the late 2000s.

      Piracy has always been based on convenience rather than cost for me. “Piracy is a service issue” is the famous quote. Additionally it’s about services not giving you ownership over the thing you purchased. Which is what a lot of software has become.

      • Truscape@lemm.ee
        link
        fedilink
        English
        arrow-up
        6
        ·
        2 days ago

        Yeah, Gabe Newell definitely was quite forward thinking when he came to that conclusion, and I can definitely say it works well for my Steam Library.

        Honestly at this point the main force that brings me to hunt for media is subscription services, since it always feels like a rug pull compared to alternatives. I paid for things on GOG, I get to keep the installers and back them up. I bought things on Steam, I’m not charged to reinstall or use them on other devices, and I can still download games that are delisted now (RIP poker night at the inventory).

        Now that Blu-rays are going the way of Google Stadia, getting phased out, all I can really do is just rip any media I already have and download what I may need. FOSS tools have already replaced any subscription software I would use for my engineering work.

        • LeninOnAPrayer@lemm.ee
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 days ago

          Yep. And I don’t have to use 10 different video player UIs. I can just use Plex. That lifetime pass from years ago has been worth it. Even if I know people are critical of Plex.

      • maxprime@lemmy.ml
        link
        fedilink
        English
        arrow-up
        4
        ·
        2 days ago

        Yeah I used to pirate Adobe software religiously. Every version. Now I just use inkscape and suffer through the occasional GIMP session.

  • dirtycrow@programming.dev
    link
    fedilink
    English
    arrow-up
    35
    arrow-down
    1
    ·
    3 days ago

    Publisher matters. Some random website advertising a disk cleaning utility could be malware while a Fitgirl repack most definitely isn’t. Installing something from an official Ubuntu software repository is also pretty safe, while something from a 3rd party repository or community development library could be malware. I also generally trust PDFs from Anna’s Archive and Libgen or Internet Archive, because of the reputation loss to them if it were. You can minimize your risk to a tolerable level this way.

  • 野麦さん@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    22
    ·
    2 days ago

    When engaging in criminal activity, you have no “legal” recourse for malicious behavior, so you work on the web of trust instead.

    If you can’t trust the software, nor the publisher, nor the hash verified by however many seeders, then don’t download it in the first place. Me personally, considering I install indie porn games on the regular and never once gotten a virus that I know of, I think it’s worth it to trust others.

    Of course you could always go into paranoid zero trust mode but sometimes being a social being means trusting the criminal serving you free shit isn’t ratfucking your data

  • Omega@discuss.online
    link
    fedilink
    English
    arrow-up
    12
    ·
    3 days ago

    I don’t know if the malware that could be in these games work on Linux, but I take my time in picking torrents and pick ones through uploaders I know

    • LeninOnAPrayer@lemm.ee
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 days ago

      That’s likely safe. But…

      Most malware isn’t trying to make your computer unusable anymore. That was the old days when people just wanted their “hacking” acknowledged.

      You can definitely still be running a crypto miner if you sudo’d something stupid you downloaded on Linux.

  • elidoz@lemmy.ml
    link
    fedilink
    English
    arrow-up
    11
    ·
    2 days ago

    the games I pirate are all in my Lutris app which I installed as a flatpak on Linux, so they don’t have the necessary permissions to change important files.

    also I install them in the virtual C: drive, and they normally shouldn’t thouch the virtual Z: drive. I don’t think a hack would do that because installing malware on the windows drive should be enough for most people pirating games

  • chicken@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    2 days ago

    No, I try to treat that machine like a quarantine zone, I have a two PC setup and that’s part of the reason for it. So basically I don’t log into online accounts on that one (except relatively unimportant accounts for convenience, like Steam), and I don’t do important stuff on it

  • catloaf@lemm.ee
    link
    fedilink
    English
    arrow-up
    10
    ·
    3 days ago

    I mostly just avoid running pirated software. If I have to, I run the executable bits through stuff like virustotal first. And I keep my system updated.

  • username@lemm.ee
    link
    fedilink
    English
    arrow-up
    10
    ·
    2 days ago

    I personally run all my games in Bottles (flatpak) with sandboxing on. Even if a game is available for Linux I still run the Windows version inside Bottles just so it’s slightly safer.

  • ocean@lemmy.selfhostcat.com
    link
    fedilink
    English
    arrow-up
    9
    ·
    3 days ago

    I’ve never run it because I have had zero evidence to tell me it would be safe. I do run older games in emulators up to PS2. I see no issue with that.

  • Snot Flickerman@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    1
    ·
    3 days ago

    Clean copies of GOG games can be hash-checked. The only pirated games I really fuck with are GOG.

    Although I wouldn’t be too worried even if I did because I’m in Linux, and anything I did would be sandboxed and closed off from the rest of the system since it’s running in a compatibility layer.

    • Confetti Camouflage@pawb.social
      link
      fedilink
      English
      arrow-up
      21
      ·
      3 days ago

      A compatibility layer like Wine is not a replacement for a true sandbox. Although Wine may have some basic sandboxing capabilities, the default wine configuration grants access to your home directory, which something like ransomware could take advantage of.

      • ReversalHatchery@beehaw.org
        link
        fedilink
        English
        arrow-up
        5
        ·
        3 days ago

        and even if you remove the Z: drive letter, in my understanding the software can still access your filesystem if it was prepared to call linux specific kernel functions, or if it has a copy of its own glibc or musl and is prepared to use it

          • Aceticon@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            5
            ·
            edit-2
            2 days ago

            You can configure launchers such as Lutris to run your games inside a proper sandboxing application such as “firejail”.

            Just look into “Command Prefix” under Global Options in Lutris: a sandboxing app like firejail is used by really just running the sandbox app with the original command as a parameter of it, so that means you “prefix” the original command with the sandbox app and its parameters.

            You can go as crazy as you want if you do sandboxing like that (down to only allowing access to whitelisted directories). In my case I’ve actually limited networking inside the sandbox to localhost-only.

          • ReversalHatchery@beehaw.org
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            2 days ago

            that should patch it up, mostly. flatpak gives real isolation. It’s not 100% though, things can leak, like I think X11 access is unlimited, so wine programs can read other window contents, capture and inject keystrokes and mouse events if they are prepared to do it. but wayland windows they can’t see or even know if they are open. but they may still be able to mess with your bottles config and other things installed for the bottles flatpak container