this post was submitted on 27 Aug 2023
25 points (96.3% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54539 readers
206 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Some possible issues are:
It could be a honeypot. While this likely won't be the case, if you connect to a website and download directly from there, depending on your browser and os, general privavy and anonymity, they might be able to fingerprint you. Check against some other databases from sites that you visited today that have your real name and you're bust. Unlikely, but possible.
If the website gets shut down because of suspicion of malicious activity and they intentified visitors, again, through a fingerprint or similar, it's beasically the same as a honeypot.
So basically, the complexity of modern web browsing is the general issue. How do you circumvent this? Ideally you don't. Just use a torrent with a p2p VPN in a secure and anonymous manner and you don't even have to worry about your Javascript canvas.
You lay out a highly sophisticated attack when it's simple to adjust the downloaded software to call home. Why would anyone invest that much into something like that (you left out where "some other databases" would be and how reliable they would be) when there are much simpler and more reliable approaches?
I gave examples you twat