this post was submitted on 03 Aug 2023
101 points (83.9% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54746 readers
200 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don't know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

you are viewing a single comment's thread
view the rest of the comments
[–] alexg_k@discuss.tchncs.de 3 points 1 year ago (2 children)

I agree with what you said, but how do I make sure that the cracked software is not further altered by other people and uploaded. Do you just select the torrent with the most peers? Is that enough? When using one-click-hosters it is even harder...

[–] President@lemmy.zip 6 points 1 year ago (1 children)

No. It isn't about the torrent with most peers. It is about the source and the uploader. As someone has already mentioned it, it is about the Reputation!

[–] alexg_k@discuss.tchncs.de 1 points 1 year ago

Sorry, I am not very familiar with torrents. How can I verify that a torrent comes from a certain person? Everyone can make modified copies of the original data and uploadtorrentss that look alike. How can I avoid those?

[–] merthyr1831@lemmy.world 2 points 1 year ago

It's hard! A lot of it is, like I said, reputation. Sources of safe pirated and cracked software are maintained mainly through word-of-mouth - The crappier and dodgy sources will always invest into SEO to get to the top of the results, and are more likely to avoid legal trouble as companies appreciate that malware-infested installers actually help discourage new pirates.

Also, there's generally little incentive to go beyond the basic modifications. Most online scams, even outside malware, cast the net as wide as possible and even go out of their way to avoid complexity. They get the most money out of scamming new and uneducated users who pay up quickly. The same logic means they want advanced users to know it's a scam to avoid wasting time on targets who won't bother paying anyway.

I bet there are exceptions to this rule, but since scamming and malware are such low-profit ventures there's a lot of incentive on quantity over quality.