this post was submitted on 21 Jun 2023
8 points (90.0% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
56828 readers
533 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
🏴☠️ Other communities
Torrenting:
Gaming:
💰 Please help cover server costs.
![]() |
![]() |
---|---|
Ko-fi | Liberapay |
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Oh, of course there is a way. Just open the binary in radare2/rizin/ghidra and look for suspicious code. Of course this is quite time consuming to do this with a binary file, so if you compile opensource code yourself you can at least read the annotated source. If you do not have the expertise to do this, you have to choose who you trust and be careful in general.
A sandbox VM can be just a Linux or Windows VM that is running on your local hypervisor and properly firewalled and configured for security, or in a container (less secure). If a software goes rogue it will likely infect only the VM (unless it knows a hypervisor escape). Proper virtual firewalling can help protect your home LAN.
An operating system that helps you do all this without requiring too much manual work is for example QubesOS.