this post was submitted on 15 Aug 2025
        
      
      46 points (94.2% liked)
      Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
    65040 readers
  
      
      250 users here now
      ⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
🏴☠️ Other communities
FUCK ADOBE!
Torrenting/P2P:
- !seedboxes@lemmy.dbzer0.com
 - !trackers@lemmy.dbzer0.com
 - !qbittorrent@lemmy.dbzer0.com
 - !libretorrent@lemmy.dbzer0.com
 - !soulseek@lemmy.dbzer0.com
 
Gaming:
- !steamdeckpirates@lemmy.dbzer0.com
 - !newyuzupiracy@lemmy.dbzer0.com
 - !switchpirates@lemmy.dbzer0.com
 - !3dspiracy@lemmy.dbzer0.com
 - !retropirates@lemmy.dbzer0.com
 
💰 Please help cover server costs.
![]()  | 
![]()  | 
|---|---|
| Ko-fi | Liberapay | 
        founded 2 years ago
      
      MODERATORS
      
    you are viewing a single comment's thread
view the rest of the comments
    view the rest of the comments



Note that sophisticated malware [attempts to] identify whether it is running in a VM / testbed / analysis scenario and may behave and look different between that runtime scenario and "normal use".
Analysis in a VM may not be sufficient to determine whether it is safe outside of it.
If it detects that it is in a VM and doesn't activate the malware, then I'm perfectly okay just using the software inside the VM.