Not sure if this fits here…

An OPSEC community would probably say no, so I probably don’t need to ask in those communities. But I’m curious about a (digital) pirate’s perspective on this issue…

I mean, the sources listed here are supposedly “safe” right? But honestly, how much would you trust these “safe” sources?

When doing sensitive tasks like banking or filing taxes, do you:

  • Use a different OS on the same machine? (Dualboot)
  • Or put the pirated content inside a virtual machine?
  • Or just use a completely separate computer?

And since PC is much different than a Smartphone:

  • Would the extra sandboxing on Smartphones make pirating games on a Smartphone much safer compared to on a PC? (Not that there are much mobile games worth playing, just curious)

(PC in this context referring to all personal computers, regardless of OS)

And last question:

  • Non-installed/non-executable files such as .mp4 .mkv .mp3 .pdf .epub, are mostly safe right? I mean, you are using another program to opening it, not executing a file, there aren’t much attack vectors as long as the video player / ebook viewer is up to date right? (Or am I understanding it wrong?)
  • Lka1988
    link
    fedilink
    English
    3
    edit-2
    3 months ago

    I mean, I pirated the Windows 10 installation on my gaming PC. Massgrave scripts helped out though, so there’s that.

    That said, I’m wiping Windows soon and installing LMDE. It’s the last Windows PC in my house (minus W11 work laptop - that doesn’t count though).

  • Sixty
    link
    fedilink
    English
    73 months ago

    An OPSEC community would probably say no, so I probably don’t need to ask in those communities. But I’m curious about a (digital) pirate’s perspective on this issue…

    Still committing OPSEC crimes, but I’m not as bad as I could be :P

    I mean, the sources listed here are supposedly “safe” right? But honestly, how much would you trust these “safe” sources?

    I think we’re talking about different sets of standards. Even with that in mind, my own “trusted” list is a much smaller handful of any list posted online. Trust in pirate spaces shouldn’t mean at face value and should be constantly tested with stuff like virustotal. It just means I haven’t been compromised or seen anyone else report back with an infection for a long stretch of time on a specific website. There’s always occasional breaches as malware enthusiasts test the waters now and then, usually not with a big/popular release. Stuff that could fly under the radar. Usually it comes down to whether or not that website has an active comment section or forum with active mods/admins who stamp it out continuously. I tend to prefer traditional bulletin board forums. rutracker.org or cs.rin.ru. I still don’t touch any file right away. I let other people be the “brave” lab rats. See if any squeal first. I tend to avoid niche application piracy entirely. Those seem (and have been in my youth) to be the virus hotbeds cracked by total unknown entities. Plus I don’t mind paying for independent / small company niche software. Often enough in those cases I can find a free open source alternative anyways.

    It’s worked out so far. I haven’t been compromised in my adult years. But this isn’t some “do as I do” thing, it’s basically internet street smarts. Comes with experience and infections. I minimize risk and can trust my gut now, but I acknowledge it’ll never be risk free.

    When doing sensitive tasks like banking or filing taxes, do you:

    >Use a different OS on the same machine? (Dualboot)
    >Or put the pirated content inside a virtual machine?
    >Or just use a completely separate computer?
    

    Separate computer. An otherwise useless old laptop running Fedora. OPSEC would probably say it’s not good enough because it’s on the same network as computers which installed pirated software.

    And since PC is much different than a Smartphone:

    Would the extra sandboxing on Smartphones make pirating games on a Smartphone much safer compared to on a PC? (Not that there are much mobile games worth playing, just curious)

    GrapheneOS here which does sandbox better than most, but I don’t use my smartphone for anything sensitive. That’s really without trying to, it’s just not something I ever felt the need to use a smartphone for. I’m not as familiar with Android/Linux as I am with Windows. I know exactly where to periodically check for telltale signs of infection on Windows. I can still bend that OS to my will even as it gets worse for most end users. I’m less sure of myself on anything else. Working on that, HTPC is Fedora KDE spin now. Like you say, not much mobile games to play. I think I’ve bought like…3 ever. So, never felt much need to sideload. I usually stick to F-Droid and NDS emulators anyways. I have a Picross / Picross 3D addiction.

    Non-installed/non-executable files such as .mp4 .mkv .mp3 .pdf .epub, are mostly safe right? I mean, you are using another program to opening it, not executing a file, there aren’t much attack vectors as long as the video player / ebook viewer is up to date right? (Or am I understanding it wrong?)

    Usually, but sometimes there can be a flaw in a specific application exploited. I don’t think I know of any from media formats outside of maliciously edited ROM files smc or v/z64 for cartridge based system emulators like extremely outdated ZSNES or Project64 1.6 specifically.

  • @[email protected]
    link
    fedilink
    English
    103 months ago

    I mostly just avoid running pirated software. If I have to, I run the executable bits through stuff like virustotal first. And I keep my system updated.

  • @[email protected]
    link
    fedilink
    English
    583 months ago

    Honestly I don’t run pirated software at all anymore. The risk is too high. If it’s a game then I’m happy to pay for it, and open source software covers pretty much everything else for me.

    The only exception is switch games but they run through an emulator which is quite safe.

    Most media files are safe but I’ve heard that PDFs of all files can be vectors.

    • @[email protected]
      link
      fedilink
      English
      14
      edit-2
      3 months ago

      I hadn’t really thought about it until reading this comment but I am definitely the same. I use to pirate so much software back in the day. But, I really just find myself looking for projects on GitHub that fit my needs.

      I pirated a video upscaling program just to test it out. Topaz I think it was. But it was mostly just curiosity because it was very niche in it’s performance improvement over it’s open source alternative video2x.

      That’s literally the only software I can remember pirating in the last 10 years.

      If it’s good and requires a one time purchase. I buy it. Unraid is obviously going to be an example of that for a lot of people here.

      I think I’ve spent more money donating “coffee” to good open source projects though. And going windows free for over 3 years now has been a big part of that. I can’t stand when I have to use Windows now. Work still forces it on me. But I literally only use it to SSH into my redhat VM.

      All my piracy is media these days. And that’s only because the streaming services have basically reached the point that cable did back in the late 2000s.

      Piracy has always been based on convenience rather than cost for me. “Piracy is a service issue” is the famous quote. Additionally it’s about services not giving you ownership over the thing you purchased. Which is what a lot of software has become.

      • @[email protected]
        link
        fedilink
        English
        73 months ago

        Yeah, Gabe Newell definitely was quite forward thinking when he came to that conclusion, and I can definitely say it works well for my Steam Library.

        Honestly at this point the main force that brings me to hunt for media is subscription services, since it always feels like a rug pull compared to alternatives. I paid for things on GOG, I get to keep the installers and back them up. I bought things on Steam, I’m not charged to reinstall or use them on other devices, and I can still download games that are delisted now (RIP poker night at the inventory).

        Now that Blu-rays are going the way of Google Stadia, getting phased out, all I can really do is just rip any media I already have and download what I may need. FOSS tools have already replaced any subscription software I would use for my engineering work.

        • @[email protected]
          link
          fedilink
          English
          53 months ago

          Yep. And I don’t have to use 10 different video player UIs. I can just use Plex. That lifetime pass from years ago has been worth it. Even if I know people are critical of Plex.

      • @[email protected]
        link
        fedilink
        English
        43 months ago

        Yeah I used to pirate Adobe software religiously. Every version. Now I just use inkscape and suffer through the occasional GIMP session.

  • @[email protected]
    link
    fedilink
    English
    63 months ago

    Seems like most pirated software does a good job of trying to cut software off from internet communication so that it doesn’t get sniffed out on an add-on or update query. I don’t trust most software companies anymore as far as security goes either. So the short answer is at least personally, after scanning everything before and after installation and check network monitor for anything that looks weird while running, yes I consider my system secure still.

    Curious what “safe” list you are referring to?

  • @[email protected]
    link
    fedilink
    English
    93 months ago

    I’ve never run it because I have had zero evidence to tell me it would be safe. I do run older games in emulators up to PS2. I see no issue with that.

  • @[email protected]M
    link
    fedilink
    English
    23 months ago

    When you’re discussing your own OPSEC (Operational Security for those unaware), you have to evaluate and determine your personal threat profile. Generally speaking, you need to determine what risks you’re willing to accept, what risks you’re willing to mitigate, and what risks you will not tolerate. There’s a whole field of IT dedicated to this but the general idea is for you to understand that there is no perfect solution and everything is a trade off.

    There is an inherent risk to downloading pirated software, especially software that you use for private activities (e.g. finances, etc.). With today’s landscape of mining crypto, I’d go so far as to say almost any pirated software is at risk of this.

    I would agree that generally playing media files is relatively low risk (though there was a vulnerability I read about a few years back of a zip-type attack. The details allude me at the moment).

    But for executables, you basically have two options:

    • spin up a VM to host your executable, sandboxing it from everything else.
    • trust the people who are providing the executable and run it on your computer

    Personally, I avoid pirated executables. More often than not I can find a similar open source product that I can download. My risk tolerance is not only low, but I don’t see the benefits of using a particular company’s software especially if an open source is available.

    • @[email protected]
      link
      fedilink
      English
      13 months ago

      You can also use a dedicated system for pirated games. My wife knows if I’m playing a legit game based on which computer I’m using. 😅

  • Omega
    link
    fedilink
    English
    123 months ago

    I don’t know if the malware that could be in these games work on Linux, but I take my time in picking torrents and pick ones through uploaders I know

    • @[email protected]
      link
      fedilink
      English
      73 months ago

      That’s likely safe. But…

      Most malware isn’t trying to make your computer unusable anymore. That was the old days when people just wanted their “hacking” acknowledged.

      You can definitely still be running a crypto miner if you sudo’d something stupid you downloaded on Linux.

  • @[email protected]
    link
    fedilink
    English
    363 months ago

    Publisher matters. Some random website advertising a disk cleaning utility could be malware while a Fitgirl repack most definitely isn’t. Installing something from an official Ubuntu software repository is also pretty safe, while something from a 3rd party repository or community development library could be malware. I also generally trust PDFs from Anna’s Archive and Libgen or Internet Archive, because of the reputation loss to them if it were. You can minimize your risk to a tolerable level this way.

  • Steve Dice
    link
    fedilink
    English
    73 months ago

    I don’t consider anything with Windows safe. I do all of my non-gaming computing on my laptop with Linux.

  • @[email protected]
    link
    fedilink
    English
    113 months ago

    the games I pirate are all in my Lutris app which I installed as a flatpak on Linux, so they don’t have the necessary permissions to change important files.

    also I install them in the virtual C: drive, and they normally shouldn’t thouch the virtual Z: drive. I don’t think a hack would do that because installing malware on the windows drive should be enough for most people pirating games

    • Lka1988
      link
      fedilink
      English
      43 months ago

      You do your taxes on a VM? FreetaxUSA works just fine on Linux.

      • @[email protected]
        link
        fedilink
        English
        8
        edit-2
        3 months ago

        Why is it always like this…

        Not everything and everyone is in the US.

        I also prefer Windows to Linux in the desktop environment. As for my server tasks, I mostly prefer Debian and if needed I’ll use Windows Server (obviously unlicensed/not activated).
        I’ll use what fits for the task. :)

        Edit: Also not a bad thing to separate a machine that holds sensitive data (even if they are encrypted) from another with a higher risk rating. Even if it’s Linux, Mac OS, Unix or whatever based.

        • Lka1988
          link
          fedilink
          English
          4
          edit-2
          3 months ago

          My mistake. The concept of “doing taxes” is usually US-specific, I don’t really hear about that kind of thing from users in other, more civilized countries.

          Genuinely curious though… Why use a VM for taxes?

          • @[email protected]
            link
            fedilink
            English
            33 months ago

            No worries.
            As for your questions:
            In Germany we can optionally file taxes. If we were overtaxed, we can claim the overcharged amount back.
            As for why not on my main PC: I don’t want that kind of software clogging up my main rig. Also helps keeping my digital mess a bit more organized ;)

  • @[email protected]
    link
    fedilink
    English
    5
    edit-2
    3 months ago

    I’m running the games in Linux, using Lutris as a launcher with a default configuration that wraps them in a firejail sandbox (for anybody interested, you add firejail as the “command prefix” under Global Options or in the System Options of the game) which amongst other things blocks networking.

    In fact I went and figure out how to do all that exactly because I wanted to run pirated games in Linux in a safe way and you can’t just rely on the lower probability of Windows games of having code that tries to determine if it’s being run with Wine and accesses Linux-specific functionality and files if it is.

    PS: That firejail stuff also works for Linux native games (it just wraps whatever you’re running to start the game, be it Wine or directly the game Linux binary).

  • Snot Flickerman
    link
    fedilink
    English
    103 months ago

    Clean copies of GOG games can be hash-checked. The only pirated games I really fuck with are GOG.

    Although I wouldn’t be too worried even if I did because I’m in Linux, and anything I did would be sandboxed and closed off from the rest of the system since it’s running in a compatibility layer.

    • Confetti Camouflage
      link
      fedilink
      English
      213 months ago

      A compatibility layer like Wine is not a replacement for a true sandbox. Although Wine may have some basic sandboxing capabilities, the default wine configuration grants access to your home directory, which something like ransomware could take advantage of.

      • @[email protected]
        link
        fedilink
        English
        53 months ago

        and even if you remove the Z: drive letter, in my understanding the software can still access your filesystem if it was prepared to call linux specific kernel functions, or if it has a copy of its own glibc or musl and is prepared to use it

        • ddh
          link
          fedilink
          English
          13 months ago

          Is that still the case if you use it in a flatpak e.g., Bottles?

          • @[email protected]
            link
            fedilink
            English
            5
            edit-2
            3 months ago

            You can configure launchers such as Lutris to run your games inside a proper sandboxing application such as “firejail”.

            Just look into “Command Prefix” under Global Options in Lutris: a sandboxing app like firejail is used by really just running the sandbox app with the original command as a parameter of it, so that means you “prefix” the original command with the sandbox app and its parameters.

            You can go as crazy as you want if you do sandboxing like that (down to only allowing access to whitelisted directories). In my case I’ve actually limited networking inside the sandbox to localhost-only.

          • @[email protected]
            link
            fedilink
            English
            2
            edit-2
            3 months ago

            that should patch it up, mostly. flatpak gives real isolation. It’s not 100% though, things can leak, like I think X11 access is unlimited, so wine programs can read other window contents, capture and inject keystrokes and mouse events if they are prepared to do it. but wayland windows they can’t see or even know if they are open. but they may still be able to mess with your bottles config and other things installed for the bottles flatpak container