@piracy How do i check if a crack is safe or not?

I’m trying to install a cracked version of davinci resolve on my pc, but I don’t know if it’s safe. is there a way to check easily?

#linux #help

    • @themelm@sh.itjust.works
      link
      fedilink
      English
      46 months ago

      And don’t use alone, pretty tricky to narcan yourself. Also gotta watch out lots of non-fentanyl tranqs getting mixed in with shit these days and narcan only works on opiods

    • Fracture
      link
      fedilink
      English
      186 months ago

      This is a good idea and a good practice in my opinion. Some malicious code detects when it’s being sandboxed and hides itself until it’s running somewhere it can do damage though.

      • @7Sea_Sailor@lemmy.dbzer0.com
        link
        fedilink
        English
        56 months ago

        Once malware is VM aware it can also get outside a VM. Furthermore, malware can be written to seat itself comfortably in your PC and lay low for hours, days, weeks before becoming active. Installing in a VM and waiting for shit to hit the fan is not always reliable.

        • @bamboo@lemm.ee
          link
          fedilink
          English
          106 months ago

          Getting out of a VM reliably is not usually trivial, and VM escapes are usually designed to target specific configurations rather than an arbitrary deployment. A VM with a minimum amount of shared resources is usually a reasonable security boundary unless you think the malware you’re analyzing has hypervisor-specific 0 days.

        • @sir_reginald@lemmy.world
          link
          fedilink
          English
          36 months ago

          the malware has to be very advanced and specifically target your hypervisor version to escape a VM.

          in the context of cracked software, it is highly improbable that you’ll find malware with this capabilities.

    • ddh
      link
      fedilink
      English
      16 months ago

      And start with no network for the VM

  • @BrownianMotion@lemmy.dbzer0.com
    link
    fedilink
    English
    66 months ago
    1. Scan it with AV. This might still product false positives, so understand the difference between viruses and PUPs.
    2. Go with keygens if at all possible. Run them in a sandbox, like sandboxie-plus.
    3. Only download cracks from trusted sites, and from trusted scene groups.
    4. Preferably check the crack with a MD5 or CRC, so you know its not been tampered with.
    • @sqgl@beehaw.org
      link
      fedilink
      English
      06 months ago

      If someone malicious can tamper with a crack, surely it is trivial to tamper with the NFO. So how do I know the MD5 sum is the original one?

      • @7Sea_Sailor@lemmy.dbzer0.com
        link
        fedilink
        English
        5
        edit-2
        6 months ago

        On windows, the only features locked behind the paywall are required by professionals in film. This includes, but isn’t limited to, larger than 4K timelines, 10 bit footage, advanced fusion filters and effects, niche export quality settings. As long as you’re not working in the media industry, you won’t need these.

        Try the free version first, before jumping into a crack. See if you even like it.

      • Kernal64
        link
        fedilink
        English
        36 months ago

        You’ve heard incorrectly, as I use the free version to make videos of my terrible gameplay and I usually export to MP4 using H264.

        • Keith
          link
          fedilink
          English
          26 months ago

          They’re limited only on Linux.

      • @GerPrimus
        link
        fedilink
        English
        16 months ago

        export it as some QuickTime/mov/whatever and recode it with handbrake.

  • @Pringles@lemm.ee
    link
    fedilink
    English
    26 months ago

    Well, if your AV tells you there is a backdoor in it, don’t open it, I would say. There can be valid reasons for cracks to be flagged, but you can usually check what it does by uploading it to a sandbox or checking the hash on virustotal.

  • @hexagonwin@lemmy.sdf.org
    link
    fedilink
    English
    16 months ago

    Back when I used cracks often the cracks were small keygens and sometimes a patched main exe/dll, so I could just generate the key in a vm/sandboxed environment and inspect the patched binary, usually they did nothing weird. Huge repacks are often very sketchy though… Nowadays there are many great FOSS alternatives so I tend to use them more.

  • @Kissaki
    link
    fedilink
    English
    16 months ago

    A crack changes program code and is executed. There is no easy way to check if it is safe.

    Unless you inspect the source code or binary code (directly or through reverse-engineering) you can not verify it.

    What’s left without that is attempts at gaining confidence through analysis trust of third parties - the providers, distributors, creators - who have to be confirmed beyond a matching text label too.

    The alternative to or extension of being confidently safe or accepting the risk is to sandbox the execution. Run the crack in a restricted environment with limited access in case it does things you do not want to. Optionally monitoring what it does. Which has to be put into relation of what the program does without the crack.