this post was submitted on 09 Aug 2023
72 points (95.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54443 readers
170 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

Would installing an OS on an external ssd and booting into that to run pirated software while blocking access to other drives in your system or physically unplugging them be one way?

Or are there better ways to isolate the software you run and use as much as possible?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 1 year ago (2 children)

How is the performance impact these days for games compared to running natively?

[–] [email protected] 4 points 1 year ago (1 children)

Not great but better than it used to be. Don’t do a GPU passthrough.

[–] [email protected] 4 points 1 year ago (1 children)

What's wrong with GPU passthrough?

[–] [email protected] 3 points 1 year ago (1 children)

GPU passthroughs can expose the host to a potentially compromised VM.

[–] [email protected] 1 points 1 year ago (1 children)

Interesting, do you have more information on that? Because why is GPU passthrough a problem but not other PCI devices?

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (1 children)

I don’t unfortunately. This is from a conversation I had with a researcher in VM escape.

As far as I’m aware peripherals are not actually passed through exactly but rather emulated on the guest machine. When you pass through a peripheral you’re only passing the input of that device, data is not sent upstream.

Whereas passing through the GPU you’re providing a means of accessing non-emulated devices through the hardware itself bypassing the isolation provided by virtualization entirely.

[–] [email protected] 2 points 1 year ago

That’s true, but the IOMMU on your host is supposed to prevent any accesses outside of the group you passed in

As long as the GPU is the only thing in that IOMMU group, you’re reasonably safe