[-] alexg_k@discuss.tchncs.de 3 points 8 months ago

Source for this claim?

[-] alexg_k@discuss.tchncs.de 2 points 10 months ago

Agreed. I think the only VPN providers that are able to keep offering port forwarding are those that log data and hand it to the authorities.

[-] alexg_k@discuss.tchncs.de 1 points 11 months ago

That's smart, but requires extra work and hardware.

[-] alexg_k@discuss.tchncs.de 1 points 11 months ago

Sorry, I am not very familiar with torrents. How can I verify that a torrent comes from a certain person? Everyone can make modified copies of the original data and uploadtorrentss that look alike. How can I avoid those?

[-] alexg_k@discuss.tchncs.de 3 points 11 months ago

I agree with what you said, but how do I make sure that the cracked software is not further altered by other people and uploaded. Do you just select the torrent with the most peers? Is that enough? When using one-click-hosters it is even harder...

[-] alexg_k@discuss.tchncs.de 4 points 11 months ago

Ivpn stopped as well. Let's hope this is not a trend..

[-] alexg_k@discuss.tchncs.de 4 points 11 months ago

Interesting. If there are reputable packers / crackers, why do they not uses GPG to sign the software? That way, no one can manipulate and reupload the software.

[-] alexg_k@discuss.tchncs.de 4 points 11 months ago

Well, I prefer to go the hospital with licensed personnel and not to ask some guy on the internet to perform surgery..

[-] alexg_k@discuss.tchncs.de 5 points 11 months ago

If you notice the malware..

[-] alexg_k@discuss.tchncs.de 12 points 11 months ago

I think it is very rare to find or even craft a video file that is able to allow for arbitrary code execution on an updated video player software like VLC. The same is true for photos or documents with the exception of office documents using macros.

[-] alexg_k@discuss.tchncs.de 14 points 11 months ago

Good and valid point. I use opensource software wherever I can.

Though paid software is not going to encrypt your data for ransom or use a keylogger to steal bitcoin (yet).

101

I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don't know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

34

Using public trackers it is extremely hard to find specific content with German audio.

How do I find access to these private trackers?

  • Borgzelle
  • Coastal-Crew
  • The-Crazy-Ones
  • Dark-Shadow
  • The Falling Angels
  • Fantastic Heaven
  • House of Devil
  • Immortuos
  • MaDs Revolution
  • MNV
  • The-New-Fun
  • The New Retro
  • The Shinning
  • Speedmaster HD
  • SpeedTorrent Reloaded
  • Spirit of Revolution
  • Torrent-Explosiv
  • Torrent Sector Crew
  • TorrentSyndikat
  • World-of-Tomorrow

I have a 24/7 server running and seed generously. Any tips on how to join the community are appreciated.

view more: next ›

alexg_k

joined 1 year ago