I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don’t know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

  • Deathcrow@lemmy.ml
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    1 year ago

    How come people are willing to download and install pirated software though?

    You can just remove “priated” from that statement and come to the same conclusions. Considering the amount of bugs, backdoors and 0-day exploits distributed via official software I sometimes wonder why people execute proprietary, closed source programs at all.

    An no, “reputable” companies mean nothing, just look at Microsoft clowning around with their signing keys.

  • pre@feddit.uk
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 year ago

    Worth noting that paying for a license for software doesn’t stop it being spying malware either. In fact the pirate versions often take out the spying and the reporting-to-homebase that proprietary software does.

    The photoshop that phones home to check a license is arguably more malicious than the pirate version that has been cracked so it doesn’t do that.

    • alexg_k@discuss.tchncs.deOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Good and valid point. I use opensource software wherever I can.

      Though paid software is not going to encrypt your data for ransom or use a keylogger to steal bitcoin (yet).

      • NullGator@lemmy.ca
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        There was an antivirus that was caught running a bitcoin miner in the background tbf. If memory serves it was Norton?

  • b1ab@lem.monster
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    1 year ago

    Long story short.

    1. Be prepared for disaster.
    2. Scan it. Sandbox it if concerned.
    3. Firewall inspect/block/allow every outbound comm.
    4. Get it from a trusted source.

    Basically the same stuff you should be doing with all software.

    Edit for firewall clarification.

      • b1ab@lem.monster
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        I don’t really use Windows except for playing games, so someone else may have a better answer.

        For me, I want 3 types of protection, priority order.

        1. Rootkit and ransomware protection. Lock down and protect system files.

        2. Firewall. Stop software from calling home (and possibly invalidating my forged license) and to stop malware from reaching out to command and control systems.

        3. Malware scanning and suspect execution detection. Most antivirus software detections will be in only one of a couple categories: keygen, generic trojan, or obfuscated executable. If I encounter this, I go to VirusTotal.com and drop the offending file(s) for it to scan. If I’m still concerned I will use an online sandbox execution recorder that tells you what the exe does such as outbound comms, file modifications, registry read/writes, etc.

        Windows Defender accomplishes these requirements. Although it is a bit clunky and other mainstream antivirus (paid or free) accomplish the same in a much cleaner interface.

        I cannot stress enough the importance of downloading pirated software from a trusted source.

        • MrPoopyButthole@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          1 year ago

          We are seeing on our corporate network lots of browser hikackers that connect to c&c and are used in botnet DDOS as a service. Once you install x software it sets up a persistent service that keeps modding chrome.exe etc

          Firewalling the .exe that you installed does nothing to stop the calls to c&c

          • b1ab@lem.monster
            link
            fedilink
            English
            arrow-up
            0
            ·
            1 year ago

            Fair point. Malware can tunnel through existing comms, thus firewalling the exe would do little to protect you.

            That’s why I recommended a multilayered defense and practicing good opsec.

            An exe that installs a service, modifies unrelated executables, and sends comms through an unrelated application would be a catastrophic failure in any good defense.

            If your system is this wide open then you’ll be likely to have all sorts of problems from non pirated software. Such as freeware that installs adware.

            I have tried to find these in the wild to no avail.

            • MrPoopyButthole@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 year ago

              Unfortunately the machines that get infected are not fully controlled by us but they get networking and internet from us (space rental in the building), so we isolate them as much as possible and we black hole all the bad traffic on the router level.

              Our machines all have EDR and strict security policies. Not much gets past that.

  • InterSynth@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    I trust pirates more than billion or trillion dollar companies. Also, aggressive DRM such as iLok is worse than malware, so eh.

  • Gush@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    If i were to pay for an AutoCAD license , it would be over 200$ A MONTH

  • CapnAssHolo@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    You’re thinking too technical about this. This is a money thing. Personally speaking pirated software/games were chicken soup for my poverty ridden childhood.

  • tormeh@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    Make a dedicated user on your machine for pirated software. Never give that user root. Should contain it.

  • Mothra@mander.xyz
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    It’s one of those high-risk, high-returns case scenarios. You gamble. If you succeed, you will be saving some buck. Some software licences can be very, very expensive.

    There is no way of knowing the answer to your questions. You just use your intuition and take a leap of faith.

    • dejalynn@kbin.social
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Some software licences can be very, very expensive.

      When I was in art school in the early 2000’s, I worked with computer controlled weaving looms. The program for drafting patterns and running the AVL Compu Dobby on the loom was free to download. In order to use it, though, you had to have a $3000 usb key.

        • dejalynn@kbin.social
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          The part that hurt was the ancient Mac II that ran the loom. When I encountered the Y2K bug on it, some upperclassmen said, “Oh we’ve just been turning the clock back a year.” Turned it back as far as it would go…1969