I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don’t know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

  • alexg_k@discuss.tchncs.deOP
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    I agree with what you said, but how do I make sure that the cracked software is not further altered by other people and uploaded. Do you just select the torrent with the most peers? Is that enough? When using one-click-hosters it is even harder…

    • President@lemmy.zip
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      No. It isn’t about the torrent with most peers. It is about the source and the uploader. As someone has already mentioned it, it is about the Reputation!

      • alexg_k@discuss.tchncs.deOP
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        Sorry, I am not very familiar with torrents. How can I verify that a torrent comes from a certain person? Everyone can make modified copies of the original data and uploadtorrentss that look alike. How can I avoid those?