this post was submitted on 27 Aug 2023
26 points (93.3% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54577 readers
285 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

Everybody talks about torrenting, but recently when searched for some software I stumbled on regular sites with extensive collection of cracked programs. There's many of them, but what I looked at closely was filecr . com and what I've seen puzzled me. They have many, many releases. Old, recent what you need. All neatly organized, just like regular legit software store. I've tried one of files and it was clean and worked flawlessly.

How they operate so openly? What's the catch?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 1 year ago (3 children)

Some possible issues are:

It could be a honeypot. While this likely won't be the case, if you connect to a website and download directly from there, depending on your browser and os, general privavy and anonymity, they might be able to fingerprint you. Check against some other databases from sites that you visited today that have your real name and you're bust. Unlikely, but possible.

If the website gets shut down because of suspicion of malicious activity and they intentified visitors, again, through a fingerprint or similar, it's beasically the same as a honeypot.

So basically, the complexity of modern web browsing is the general issue. How do you circumvent this? Ideally you don't. Just use a torrent with a p2p VPN in a secure and anonymous manner and you don't even have to worry about your Javascript canvas.

[–] [email protected] -1 points 1 year ago (2 children)

You lay out a highly sophisticated attack when it's simple to adjust the downloaded software to call home. Why would anyone invest that much into something like that (you left out where "some other databases" would be and how reliable they would be) when there are much simpler and more reliable approaches?

[–] [email protected] -2 points 1 year ago (1 children)