That’s smart, but requires extra work and hardware.
That’s smart, but requires extra work and hardware.
Sorry, I am not very familiar with torrents. How can I verify that a torrent comes from a certain person? Everyone can make modified copies of the original data and uploadtorrentss that look alike. How can I avoid those?
I agree with what you said, but how do I make sure that the cracked software is not further altered by other people and uploaded. Do you just select the torrent with the most peers? Is that enough? When using one-click-hosters it is even harder…
Ivpn stopped as well. Let’s hope this is not a trend…
Cool!
Interesting. If there are reputable packers / crackers, why do they not uses GPG to sign the software? That way, no one can manipulate and reupload the software.
Well, I prefer to go the hospital with licensed personnel and not to ask some guy on the internet to perform surgery…
If you notice the malware…
I think it is very rare to find or even craft a video file that is able to allow for arbitrary code execution on an updated video player software like VLC. The same is true for photos or documents with the exception of office documents using macros.
Good and valid point. I use opensource software wherever I can.
Though paid software is not going to encrypt your data for ransom or use a keylogger to steal bitcoin (yet).
Debian on servers and Arch Linux on clients. No bloat and simple!
Agreed. I think the only VPN providers that are able to keep offering port forwarding are those that log data and hand it to the authorities.