Update 'apgREADME.md'

This commit is contained in:
r2300 2020-05-15 02:30:20 +00:00
parent 6df7641a3c
commit ec692c7f24
1 changed files with 31 additions and 14 deletions

View File

@ -12,50 +12,67 @@ Some things to keep in mind:
- [PrivacyTools](https://www.privacytools.io/)
- [That One Privacy Site](https://thatoneprivacysite.net/about/)
- [PRISM ⚡ BREAK](https://prism-break.org/en/)
- This guide tries to break things down for those with little experience pirating while referring them to select resources. If you'd prefer long, more comprehensize lists of resources, check out:
- [r/Piracy wiki](https://www.reddit.com/r/Piracy/wiki/index)
- [Igglybuff's awesome-piracy](https://github.com/Igglybuff/awesome-piracy)
Written by arokai on snahp and sjjxjaj on Twitter. Feel free to message me with questions or if information here can be improved/corrected.
## 1. Protect Yourself
As I'm sure you're aware, digital piracy of copyrighted material is illegal, to varying degrees depending on where you live. I highly recommend reading up on copyright enforcement in your country. But generally speaking, so long as you only intend to download and not upload content, and take precautionary measures, you will be golden.
As I'm sure you're aware, digital piracy of copyrighted material is illegal, to varying degrees depending on where you live. I highly recommend reading up on copyright enforcement in your country. But generally speaking, so long as you only intend to download and not upload content, and take precautionary measures, you will be golden. Skip this section if you don't care about internet privacy and safety :(
### Ad-blocking
Ad-blocking software makes naviagating sketchy websites a lot easier. Most ads are just a nuisance, but plenty more can be a danger to your computer. For example, many less-legitimate pirate sites will fill a page with fake download buttons, which then prompts you to download a virus disguised as the content you were looking for.
I make do with the ad-blocker built into the [Brave browser](https://brave.com/), but I cannot recommend enough to you [uBlock Origin](https://github.com/gorhill/uBlock), a browser extension that can block ads. Instructions for installation of within the link. It is very feature rich, and so if you are only looking to block ads, do not bother with the many configurations. After installing it should be enabled by default.
I make do with the ad-blocker built into the [Brave browser](https://brave.com/), but I cannot recommend enough to you [uBlock Origin](https://github.com/gorhill/uBlock), a browser extension that can block ads. Installation instructions are within the link. It is very feature rich, and so if you are only looking to block ads, do not bother with the many configurations. After installing it should be enabled by default.
### Sandboxes and Virtual Machines
Just downloaded pirated software or a game, and don't entirely trust the source you got it from? While I cannot recommend downloading from sources you don't entirely trust, if you insist, sandbox software and virtual machines can make it safer.
Just downloaded pirated software or a game, and don't entirely trust the source you got it from? While I cannot recommend downloading from sources you don't entirely trust, if you insist on it, sandbox software and virtual machines can make it safer.
**Sandboxes**
From Wikipedia:
> ["...a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading."](https://en.wikipedia.org/wiki/Sandbox_(computer_security))
Or in simpler terms, a sandbox creates an isolated environment on your computer. Running programs inside of one prevents the program from effecting other parts of your system. I recommend using [Sandboxie](https://www.sandboxie.com/DownloadSandboxie). After installation, using it is as simple as finding the program you want to run sandboxed, right clicking it, and hitting "Run Sandboxed".
A sandbox creates an isolated environment on your computer. Running programs inside of one prevents the program from effecting other parts of your system. I recommend using [Sandboxie](https://www.sandboxie.com/DownloadSandboxie). After installation, using it is as simple as finding the program you want to run sandboxed, right clicking it, and hitting "Run Sandboxed".
**Virutal Machines**
F
A virtual machine can run a second, virtual computer within your real computer. Though a different concept, you can use a virtual machine for the same purposes as a sandbox. If you accidentally download and run a program with viruses, only the virtual machine will be infected, not your physical system. It's a bit more technical, and requires more processing power, but allow me to quickly run through the process of setting up a virtual machine. You can find a more detailed tutorial [here](https://www.nakivo.com/blog/use-virtualbox-quick-overview/).
Though a different concept, you can use a virtual machine for the same purposes of a
1. Find and download an iso file for the operating system you want to run. [[Windows]](https://www.microsoft.com/en-us/software-download/windows10) [[Linux]](https://www.linux.org/pages/download/)
2. Install [VirtualBox](https://www.virtualbox.org/wiki/Downloads).
3. Run the program and click "New".
4. Select a name for the new virtual machine, as well as the type and version of operating system you downloaded for it.
5. You will be asked to allocate RAM to the virtual machine. Stick the recommended amount.
6. Create a VDI virtual hard disk, dynamically allocated with the recommended amount of space. (You may have to search for what is recommended for the operating system you're running.)
7. Once created, right click on your virtual machine and click "Settings..."
8. Under General > Advanced, set "Drag'n'Drop" to "Bidirectional".
9. Under System > Motherboard, click on the "Boot Order" options and use the arrow on the right to set "Optical" as the first option, and "Hard Disk" as the second.
10. Under Storage, click on the disc icon that has the word "Empty" next to it. Then on the right panel click the disc icon with the downwards arrow on it. Select "Choose/Create a Virtual Optical Disc...".
11. Click "Add", find the iso file you downloaded earlier, and select it. Click "Choose".
12. Those are all the settings changes you need, click OK, and then you can start the machine! It will boot up like any other computer, and by dragging and dropping programs into the virtual machine, you can test run them there without risking your device.
### Virtual Private Networks (VPN)
From Wikipedia:
> ["A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network."](https://en.wikipedia.org/wiki/Virtual_private_network)
But that's a little technical for some people. What you need to know, is that a VPN can protect your location and identity from sites and tools you use, by changing your IP Address. While it sounds like a godsend, it's crucial to remember that there is no such thing as complete anonymity on the internet. Because your VPN provider can still see your dada, a VPN is only as secure as it's provider is trustworthy. However despite it's insecurities, VPNs can still be helpful and even necessary in specific situations. Namely while torrenting, but more on that in the torrenting section. Please review [this information](https://www.privacytools.io/providers/vpn/#info) about VPNs before purchasing one or discounting them altogether.
But that's a little technical for some people. What you need to know, is that a VPN can protect your location and identity from sites and tools you use, by changing your [IP Address](https://simple.wikipedia.org/wiki/IP_address). While it sounds like a godsend, it's crucial to remember that there is no such thing as complete anonymity on the internet. Because your VPN provider can still see your dada, a VPN is only as secure as it's provider is trustworthy. However despite it's insecurities, VPNs can still be helpful and even necessary in specific situations. Namely while torrenting, but more on that in the [torrenting section](https://git.disroot.org/r2300/AnotherPiracyGuide/src/branch/master/apgREADME.md#user-content-4-torrents). Please review [this information](https://www.privacytools.io/providers/vpn/#info) about VPNs before purchasing one or discounting them altogether.
If you decide a VPN would be useful for you, please purchase one. Free VPN providers are significantly more likely to dishonor no-log policies and sell your data. Refer to That One Privacy Guy's [VPN comparison chart](https://thatoneprivacysite.net/#simle-vpn-comparison) when choosing one. Once you've purschased a VPN and installed the application for it
If you decide a VPN would be useful for you, please purchase one. Free VPN providers are significantly more likely to dishonor no-log policies and sell your data. Refer to That One Privacy Guy's [VPN comparison chart](https://thatoneprivacysite.net/#simle-vpn-comparison) when choosing one. Once you've purchased a VPN and installed the application for it, use is usually as simple as clicking 1 button to enable it.
### Onion Networking / Tor
## 2. Streaming
## 3. Direct Downloads
## 2. Direct Downloads
## 4. Torrents
### What are torrents?
## 3. Torrents
### What are torrents?
## 4. Streaming
Simply put, most pirate streaming sites are awful. They're full of malicious ads and make you jump through hoops to view content
## 5.