Everybody talks about torrenting, but recently when searched for some software I stumbled on regular sites with extensive collection of cracked programs. There’s many of them, but what I looked at closely was filecr . com and what I’ve seen puzzled me. They have many, many releases. Old, recent what you need. All neatly organized, just like regular legit software store. I’ve tried one of files and it was clean and worked flawlessly.

How they operate so openly? What’s the catch?

  • Devjavu@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 year ago

    Some possible issues are:

    It could be a honeypot. While this likely won’t be the case, if you connect to a website and download directly from there, depending on your browser and os, general privavy and anonymity, they might be able to fingerprint you. Check against some other databases from sites that you visited today that have your real name and you’re bust. Unlikely, but possible.

    If the website gets shut down because of suspicion of malicious activity and they intentified visitors, again, through a fingerprint or similar, it’s beasically the same as a honeypot.

    So basically, the complexity of modern web browsing is the general issue. How do you circumvent this? Ideally you don’t. Just use a torrent with a p2p VPN in a secure and anonymous manner and you don’t even have to worry about your Javascript canvas.

    • Kissaki@feddit.de
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      3
      ·
      1 year ago

      You lay out a highly sophisticated attack when it’s simple to adjust the downloaded software to call home. Why would anyone invest that much into something like that (you left out where “some other databases” would be and how reliable they would be) when there are much simpler and more reliable approaches?