this post was submitted on 03 Aug 2023
117 points (94.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54476 readers
496 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don't know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

you are viewing a single comment's thread
view the rest of the comments
[–] merthyr1831@lemmy.world 43 points 1 year ago (6 children)

It's partly an honor system but also, anyone distributing malicious cracks are quickly called out whether its on public tracker comments like PirateBay or removed from private trackers.

Distributors of GOOD and CLEAN cracks often earn good rep in the community too, like Monkrus which I've had no issue with before.

Also, in my experience, installing a malware-packaged adobe app isn't actually all that bad if you run a malware scan immediately afterwards. With the scale and breadth of software piracy there isn't much money in making advanced malwares beyond bundling an existing one into an installer. I don't recommend it, but it's still easier and cheaper than paying Adobe!

TLDR the community polices itself pretty well considering.

[–] alexg_k@discuss.tchncs.de 3 points 1 year ago (3 children)

I agree with what you said, but how do I make sure that the cracked software is not further altered by other people and uploaded. Do you just select the torrent with the most peers? Is that enough? When using one-click-hosters it is even harder...

[–] President@lemmy.zip 6 points 1 year ago (1 children)

No. It isn't about the torrent with most peers. It is about the source and the uploader. As someone has already mentioned it, it is about the Reputation!

[–] alexg_k@discuss.tchncs.de 1 points 1 year ago

Sorry, I am not very familiar with torrents. How can I verify that a torrent comes from a certain person? Everyone can make modified copies of the original data and uploadtorrentss that look alike. How can I avoid those?

load more comments (1 replies)
load more comments (3 replies)