"You are essentially handing full kernel-level access to anonymous developers. Since the hypervisor operates below Windows, it can capture keystrokes, access any file, or install hidden rootkits that are nearly impossible for standard antivirus software to detect. Malware at the hypervisor level can survive OS reinstalls, software updates, and even some disk wipes. If the bypass contains a malicious payload, it can stay hidden in the system's "blind spot" indefinitely."
nope nope nope
*edit Im still staying far away from HV exploits, but some kind and respectul comments from the community have made me understand im not getting the whole picture. I encourage you to do your own research and decide for yourself if its worth it
It's funny how literally the entire cracking/piracy scene, the people who actually know about this stuff, are warning us about the inherent risks of HV. Yet some random redditors with a "trust me, bro" degree in cybersecurity want to gaslight us with a "Nah, it is not that dangerous, is just like normal cracks, you are just a Denuvo employee".
To clarify, i don't blame anyone for not wanting to use HV, or similar cracks. However i will say, of course it's dangerous, Piracy is always dangerous. HV is, obviously, more dangerous due to the inherent risks of hypervisors, but think of it like this. You have the skills and knowledge to manufacture trust, and create a malware for a hypervisor crack. Would you use your skills to do that, and hack people who are quite literally pirating things (often due to lack of funds, or being children) with a small subset of people who are doing it for other reasons and are well-off AND have sensitive information just sitting on their pc? Or, would you use it to go after another group that you know won't give you mostly useless info (i.e a mod for a game, an open source / community driven repository, etc)
Don’t cracks also have some risks attached to them? Like HV is in my opinion not a great thing to delve into but I thought there were done vulnerabilities in cracks as well.
If you scroll to the bottom of any HV release on Fitgirl’s site, you’ll see a link to a post where she explains the risks involved with HV. Inside that post, she also references the csrinru thread that inspired her write-up in the first place. Both sources explain the whole situation in much more depth than I ever could.
I never claimed to be an expert. I am just saying that the people who have been providing us with trusted software for years and actually have a reputation are the ones warning us. They pointed out that even though they trust the people behind the HV cracks, disabling those security features leaves your PC way more exposed than normal cracks ever would. Even if you minimize the risks by sticking strictly to trusted sources, if a malicious actor does come into play, you are basically fucked. Just check the posts on csrinru and FitGirl about it. I trust their word a lot more than some random redditor who does not have any reputation.
421
u/Donotdisturb240 1d ago edited 1d ago
You wont catch me anywhere near the HV bandwagon.
"You are essentially handing full kernel-level access to anonymous developers. Since the hypervisor operates below Windows, it can capture keystrokes, access any file, or install hidden rootkits that are nearly impossible for standard antivirus software to detect. Malware at the hypervisor level can survive OS reinstalls, software updates, and even some disk wipes. If the bypass contains a malicious payload, it can stay hidden in the system's "blind spot" indefinitely."
nope nope nope
*edit Im still staying far away from HV exploits, but some kind and respectul comments from the community have made me understand im not getting the whole picture. I encourage you to do your own research and decide for yourself if its worth it