What’s best practice to safely play pirated games on Linux? Looking to mitigate potentially malicious executables from wrecking havoc on my system.

  • cecilkorik@lemmy.ca
    link
    fedilink
    English
    arrow-up
    23
    ·
    5 months ago

    It is mostly a myth (and scare tactic invented by copyright trolls and encouraged by overzealous virus scanners) that pirated games are always riddled with viruses. They certainly can be, if you download them from untrustworthy sources, but if you’re familiar with the actual piracy scene, you have to understand that trust is and always will be a huge part of it, ways to build trust are built into the community, that’s why trust and reputation are valued higher than even the software itself. Those names embedded into the torrent names, the people and the release groups they come from, the sources where they’re distributed, have meaning to the community, and this is why. Nobody’s going to blow 20 years of reputation to try to sneak a virus into their keygen. All the virus scans that say “Virus detected! ALARM! ALARM!” on every keygen you download? If you look at the actual detection information about what it actually detected, and you dig deep enough through their obfuscated scary-severity-risks-wall-of-text, you’ll find that in almost all cases, it’s actually just a generic, non-specific detection of “tools associated with piracy or hacking” or something along those lines. They all have their own ways of spinning it, but in every case it’s literally detecting the fact that it’s a keygen, and saying “that’s scary! you won’t want pirated illegal software on your computer right?! Don’t worry, I, your noble antivirus program will helpfully delete it for you!”

    It’s not as scary as you think, they just want you to think it is, because it helps drive people back to paying for their software. It’s classic FUD tactics and they’re all part of it. Antivirus companies are part of the same racket, they want you paying for their software too.

    • Glide@lemmy.ca
      link
      fedilink
      English
      arrow-up
      12
      ·
      edit-2
      5 months ago

      Downloaded a game which Windows Defender flagged as high-threat for containing “Cracked game content” the other day. Why yes, my cracked copy of this game IS cracked, thank you for noticing.

      • NoneYa@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        5 months ago

        It’s funny that would be a thing when it’s been found that even the companies, themselves, like Nintendo, have been caught using pirated versions of their own games for redistribution.

        Wonder if those games would get detected for the same reason.

    • lemmyingly@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 months ago

      Unless you inspect every line of code and/or monitor your computer activity to a super human level then you’ll never know.

      Viruses don’t behave like a neanderthal like they used to 20 years ago, so just because you don’t notice a virus doesn’t mean you don’t have one. Let’s be honest, viruses are still a thing and botnets have become a thing. These don’t magically appear from nothing.

      You shouldn’t be blindly trusting anyone on the internet, especially those not abiding by the laws. People and entities can be impersonated. They can behave differently at any moment.

      Personally i would do one of three things, run pirated content, in a VM, on a separate drive, or on a dedicated computer - because why take the risk when you don’t have to.

        • lemmyingly@lemm.ee
          link
          fedilink
          English
          arrow-up
          0
          ·
          5 months ago

          I think corporations are doing quite well if your example is from 19 years ago.

          In the same era, we had things like LimeWire where files were frequently viruses, CP, or similar masquerading as innocent files like the latest song from your favorite artist.

          I’ve never tried closed trackers, so I can’t speak on that side of pirate life but I think it’s naive to trust pirates on public trackers.

      • ElderWendigo@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        5 months ago

        It’s kinda trivial to limit their ability to do anything in Linux though. It’s not as if virus authors are gonna waste their time trying to exploit a demographic that is both small and extremely fragmentary when they can just write for windows.

    • stratosfear@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      5 months ago

      Maybe times have changed but when I was in the warez scene 25+ years ago and essentially pirated every game I played, I saved all those games and the keygen.exe files and when they get scanned by modern AV they all come back infected. If anything it’s different because viruses are pointless now with the internet and there are much broader malware injection points nowadays than the minimal game pirating scene. But yeah I don’t know what I’m talking about, just my historical POV.

    • z00s@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      5 months ago

      If I don’t hear that sweet 8 bit techno house blaring out of the PC speaker, then I start to worry

    • Dyskolos@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 months ago

      So true. I’m in the warez-scene for >3 decades now, never had a single issue. But nowadays legit software, especially AAA? Ugh…

  • JJLinux@lemmy.ml
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    5 months ago

    It’s not impossible, but it is HIGHLY unlikely that malware directed at windows (which must be 99.99999% of cracked games, as they are for Windows) can affect anything in Linux. Sure, it could be that your Wine/Proton suffers. What happens then? Easy. Remove, reinstall, move on.

    Having said that,I’ll if I were you, I’d just install whatever I want.

    I play Sins of a Solar Empire regularly, and it’s pirated. All the Command & Conquer games, StarCraft (1 and 2), Warcraft (1 and 2) and many more, all cracked.

    And as someone else mentioned, I’m more concerned about malware and/or spyware from the publishers than from the cracked games uploaders.

  • lemmefixdat4u@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    5 months ago

    Have a machine dedicated to gaming, no Internet access, with a swappable SSD. Make a clean OS install. Clone it to an external backup drive, then disconnect the backup. Install and play. If you want to play another game, format the drive, clone the OS from the external backup, install and play. If you want to play multiple games, have them on different SSD drives.

    It’s hardware sandboxing.

    • Toribor@corndog.social
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      5 months ago

      If you’re this concerned you might as well be running Windows in a VM with gpu passthrough.

    • hackris@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 months ago

      Very good solution. However, what benefit does the user get by formatting the drive every time a new game is to be installed? I mean, the thing already doesn’t have internet access and no important data is on the drive anyway. Am I missing something?

      • ridethisbike@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        5 months ago

        Well you have to get the install files moved over to the sandboxed PC somehow. If it is infected and you plug in the USB drive or whatever that goes back and forth, you could spread the virus through it.

  • henfredemars@infosec.pub
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    5 months ago

    Safest possible way? Separate machine on a different network, like guest Wi-Fi.

    Realistically? I use containers blocking Internet and most file access and only use sources I trust not Internet rando releases.

    • stratosfear@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      5 months ago

      Right, to elaborate run a packet capture and monitor the IPs your system connects to when installing and playing the game.

      Never use a web browser with email or any other access to online accounts, clear all cookies after each browsing session.

      I’d argue have a separate boot drive with absolutely nothing stored, nothing critical, no cookies, it’s single use of getting the games and hell, probably even run a VPN while playing the games so no tracing back to ISP public IP.

  • CleanDefinition@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    5 months ago

    Bottles maybe? It’s a flatpak so it’s containerized.

    You shouldn’t worry that much anyway, if a pirated game has a virus it’s most likely designed for Windows.

    • brakenium@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      Wine might translate the windows calls to Linux depending on what the malware does

      • ElderWendigo@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 months ago

        And that would achieve what exactly? The exploits won’t be the same. The permission structure shouldn’t allow it to do anything that would compromise the system. Maybe it can phone home, but to what effect?

        • brakenium@lemm.ee
          link
          fedilink
          English
          arrow-up
          0
          ·
          5 months ago

          Does it necessarily need exploits? I might be wrong, but I believe games running in wine can access any file your user can. It should still be able to delete, edit or encrypt them. Wine just translates calls, it doesn’t create a locked down container or anything iirc

          • ElderWendigo@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            ·
            5 months ago

            Proper permissions would not give the game access to anything it didn’t actually need to run. It should be running either as it’s own user or wine. You don’t need a container. How did you think containers get locked down anyway? They run as a user with very limited access.

        • Sethayy@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          5 months ago

          If youre running it under your current user, theoretically anything your user can do (which usually means all your personal files)

          I’m not too sure bottle’s default security cause I use flatseal so aggressively, but even allowing access to a directory where your games are stored could be a security issue (just for simple malicious things like filling up your drive)

          • ElderWendigo@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 months ago

            If youre running it under your current user, theoretically anything your user can do (which usually means all your personal files)

            That would be poorly configured permissions. There’s very little reason you should let any game run under a users own permissions, especially if you got it from a less than reputable source. Proper permissions would give it only enough access to run, nothing more.

            • Sethayy@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              2
              ·
              5 months ago

              I dont think the workflow is yet streamlined enough to assume a regular user would create a per game-user, that being said I just checked bottle’s default permissions and its not horrible, no filesystem access other than the app’s.

              That being said it still is gonna be vulnerable to x11 keyloggers like most linux software is rn

  • voxelastronaut@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 months ago

    Get your games from trusted sources, make sure the hash lines up, and don’t worry about it. Especially since you’re on Linux–you’ll be absolutely fine. Common sense goes a long way.

  • Harbinger01173430@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 months ago

    What if I told you that using Linux ended my times of downloading fit girl and other repacks and I just decided to buy from steam? XD

  • Mereo@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    Run them in Bottle, then disable internet access for the games.

  • EP51L0N@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    Virtual machines. Disable drag-and-drop and shared folders/clipboard. It’s still not impossible to escape the vm but it’s very difficult and most malware isnt capable of doing that.

    • EP51L0N@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      Don’t use VirtualBox. It’s great for most things but it’s not powerful enough for games. Use VMware Player or Workstation and use the max amount of vram it’ll let you.

      • Zeon@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        5 months ago

        Why not use KVM? It’s FOSS, and it’s pretty simple to use, at least in my opinion. All I know is that I wouldn’t want any company spying on me if I was doing something illegal.

        • EP51L0N@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          5 months ago

          KVM requires a second gpu to utilize gpu-acceleration. Unlike VMware, which can just steal vram from your one card and use it for the vm.

          • Zeon@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            5 months ago

            Actually, KVM doesn’t necessarily require a second GPU for acceleration. If you have a CPU with integrated graphics, you can use that for the host system and pass through a dedicated GPU to the VM.

              • Zeon@lemmy.world
                link
                fedilink
                English
                arrow-up
                0
                arrow-down
                1
                ·
                edit-2
                5 months ago

                Referring to integrated graphics as a ‘second GPU’ is somewhat misleading. They do provide additional graphics processing, but they’re part of the CPU and not a separate, dedicated graphics card.

                • Sethayy@sh.itjust.works
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  5 months ago

                  But it still processes GPU code, telling anyone you can run vulkan on your ‘fancy CPU’ they’ll probably look at you like youre crazy

                  Also then for a device without a dedicated, would you consider not to have a gpu?

  • Rez@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    Not an expert, but I assume Bottles would be a good idea. It allows you to create separate wine prefixes for each app so if any app is malicious, it shouldn’t affect any other one.

  • Sethayy@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    My current setup is a halfway between insanely secure and functionally useless, so take this with a grain of salt;

    SELinux on a debian LTS host, VM to something similarly secure (I use arch to try n get the debian LTS stability + arch quick patches but i might be wrong), hosting as s new user per app a wine podman container using x11docker’d xpra2-xwayland option, and gpu pass through it all.

    This gives pretty fine grain control to each individual feature your app is allowed to run, and numerous layers in case like 3 of them all concurrently have security flaws.

    Eventually I want to look into the feasibility of sliding g-visor in the podman layer, but I figured I should probably make sure I spend some time actually plating games lol

  • baduhai@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    If you’re really paranoid, you could run the game inside bubblewrap, inside a container.

  • BlanK0@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    If you are on Linux you could simply run a firejailed wine on the executable and not worry about much, if the firejailling stops something from working then the executable is kinda fishy since firajailed games should work (I tried it and it works)