this post was submitted on 26 Jan 2024
135 points (94.1% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54627 readers
561 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

What's best practice to safely play pirated games on Linux? Looking to mitigate potentially malicious executables from wrecking havoc on my system.

you are viewing a single comment's thread
view the rest of the comments
[–] brakenium@lemm.ee 7 points 9 months ago (1 children)

Wine might translate the windows calls to Linux depending on what the malware does

[–] ElderWendigo@sh.itjust.works 2 points 9 months ago (2 children)

And that would achieve what exactly? The exploits won't be the same. The permission structure shouldn't allow it to do anything that would compromise the system. Maybe it can phone home, but to what effect?

[–] brakenium@lemm.ee 1 points 9 months ago (1 children)

Does it necessarily need exploits? I might be wrong, but I believe games running in wine can access any file your user can. It should still be able to delete, edit or encrypt them. Wine just translates calls, it doesn't create a locked down container or anything iirc

[–] ElderWendigo@sh.itjust.works 2 points 9 months ago

Proper permissions would not give the game access to anything it didn't actually need to run. It should be running either as it's own user or wine. You don't need a container. How did you think containers get locked down anyway? They run as a user with very limited access.

[–] Sethayy@sh.itjust.works 1 points 9 months ago* (last edited 9 months ago) (1 children)

If youre running it under your current user, theoretically anything your user can do (which usually means all your personal files)

I'm not too sure bottle's default security cause I use flatseal so aggressively, but even allowing access to a directory where your games are stored could be a security issue (just for simple malicious things like filling up your drive)

[–] ElderWendigo@sh.itjust.works 1 points 9 months ago (1 children)

If youre running it under your current user, theoretically anything your user can do (which usually means all your personal files)

That would be poorly configured permissions. There's very little reason you should let any game run under a users own permissions, especially if you got it from a less than reputable source. Proper permissions would give it only enough access to run, nothing more.

[–] Sethayy@sh.itjust.works 2 points 9 months ago

I dont think the workflow is yet streamlined enough to assume a regular user would create a per game-user, that being said I just checked bottle's default permissions and its not horrible, no filesystem access other than the app's.

That being said it still is gonna be vulnerable to x11 keyloggers like most linux software is rn