this post was submitted on 02 Apr 2025
34 points (100.0% liked)

libre

9931 readers
26 users here now

Welcome to libre

A comm dedicated to the fight for free software with an anti-capitalist perspective.

The struggle for libre computing cannot be disentangled from other forms of socialist reform. One must be willing to reject proprietary software as fiercely as they would reject capitalism. Luckily, we are not alone.

libretion

Resources

  1. Free Software, Free Society provides an excellent primer in the origins and theory around free software and the GNU Project, the pioneers of the Free Software Movement.
  2. Switch to GNU/Linux! If you're still using Windows in $CURRENT_YEAR, flock to Linux Mint!; Apple Silicon users will want to check out Asahi Linux.

Rules

  1. Be on topic: Posts should be about free software and other hacktivst struggles. Topics about general tech news should be in the technology comm or programming comm. That doesn't mean all posts have to be serious though, memes are welcome!
  2. Avoid using misleading terms/speading misinformation: Here's a great article about what those words are. In short, try to avoid parroting common Techbro lingo and topics.
  3. Avoid being confrontational: People are in different stages of liberating their computing, focus on informing rather than accusing. Debatebro nonsense is not tolerated.
  4. All site-wide rules still apply

Artwork

founded 4 years ago
MODERATORS
 

Asking for a friend

all 19 comments
sorted by: hot top controversial new old
[–] Tabitha@hexbear.net 6 points 1 day ago (1 children)

TBH I would not trust that wine fully protects you from a windows virus, after all, wine's purpose is to emulate windows APIs, which you can assume are inheritly insecure. That said, wine targets compatibility with software, not viruses, and Linux is inheritly more secure than windows, and I've literally never heard of someone getting a virus from pirated games, even on windows. Also Linux viruses 99% of the time always targeting webservers, if you actually got any virus at all, it'll probably be very confused or a lazy bitcoin miner.

Your time is best spent trying to make sure you get your stuff from reputable sources. Most viruses will be targeting SEO of really popular games made in the last year.

[–] Tabitha@hexbear.net 4 points 1 day ago

Your time is best spent

also, make sure you're backed up and can recover if you do get a virus. It's really unlikely a virus will be the reason, but backups are honestly like brushing your teeth.

Ive played almost exclusively pirated games for like a decade and ignored hundreds of windows security alerts telling me there's a virus and nothing bad happened to me except for the dmca notices i got every time i downloaded Total Warhammer 2 and forgot to use a vpn

[–] Terrarium@hexbear.net 3 points 22 hours ago

To be safe you could make a user account just for pirated games. This would make it so that any games running on the compatibility layer wouldn't be able to do anything particularly malicious. I think the overall risk is already low but a separate user would make it basically nonexistent.

[–] tombruzzo@hexbear.net 5 points 1 day ago (1 children)

It's fine. If you're worried about viruses or anything dodgy in the game files, linux is like a natural antivirus program because most viruses are windows programs for windows exploits.

Bottles isn't a containerised and sandboxes app like a web browser, it's more that it groups all the configurations and dependencies for different applications of WINE. So you can easily jump between a 32-bit Windows 98 configuration and a modern Windows 10 configuration depending on what you're playing

[–] PorkrollPosadist@hexbear.net 3 points 14 hours ago* (last edited 14 hours ago) (1 children)

It's fine. If you're worried about viruses or anything dodgy in the game files, linux is like a natural antivirus program because most viruses are windows programs for windows exploits.

This is not great advice. Viruses have historically been less common on Linux than Windows for a number of reasons (something something material conditions). The Unix operating system model has had a more robust security model than Windows for a long period of time, the majority of software on Linux is obtained from trustworthy centralized repositories which have various degrees of oversight, and it has historically been an incredibly small section of the market compared to Windows, making it not worth the effort to write general purpose malware for. Things have changed a great deal since the zenith of Limewire though.

Windows security has gotten substantially better (certainly not bulletproof, but it used to be nonexistent). The days of everyone running everything on unrestricted admin accounts died with Windows XP 15 years ago, narrowing the gap between NT and Unix. If somebody is going to write a virus today, it is just as likely to target end-user software (like a web browser or a word processor) as it is to target the operating system. There is a long historical catalog of security vulnerabilities which have been patched, leaving a trail of breadcrumbs for malware authors to target outdated software. A flaw in the OS's security model (i.e. privilege escalation) is not necessary to conduct surveillance, steal sensitive information, DDOS random sites, hold your files ransom, or get a process to re-launch every time you log in. All you need is for malicious code to be executed.

With the introduction of the Linux kernel into billions of consumer devices (wireless routers, android phones), and the introduction of GNU+Linux into consumer devices like the Steam Deck, the incentives to produce malware targeting GNU+Linux are constantly growing. Additionally, with the constant forward march of compatibility layers like WINE / Proton, it may not even be necessary for malware authors to specifically target Linux users. Here is an excerpt from the WINE FAQ (which applies just as much to Proton, as it is simply a fork of WINE):

Is Wine malware-compatible?

Yes. Just because Wine runs on a non-Windows OS doesn't mean you're protected from viruses, trojans, and other forms of malware.

There are several things you can do to protect yourself:

  • Never run executables from sites you don't trust. Infections have already happened.
  • In web browsers and mail clients, be suspicious of links to URLs you don't understand and trust.
  • Never run any application (including Wine applications) as root (see above).
  • Use a virus scanner, e.g. ClamAV is a free virus scanner you might consider using if you are worried about an infection; see also Ubuntu's notes on how to use ClamAV. No virus scanner is 100% effective, though.
  • Removing the default Wine Z: drive, which maps to the unix root directory, is a weak defense. It will not prevent Windows applications from reading your entire filesystem, and will prevent you from running Windows applications that aren't reachable from a Wine drive (like C: or D:). A workaround is to copy/move/symlink downloaded installers to ~/.wine/drive_c before you can run them.
  • If you're running applications that you suspect to be infected, run them as their own Linux user or in a virtual machine (the ZeroWine malware analyzer works this way).

How good is Wine at sandboxing Windows apps?

Wine does not sandbox in any way at all. When run under Wine, a Windows app can do anything your user can. Wine does not (and cannot) stop a Windows app directly making native syscalls, messing with your files, altering your startup scripts, or doing other nasty things.

You need to use AppArmor, SELinux or some type of virtual machine if you want to properly sandbox Windows apps.

Note that the winetricks sandbox verb merely removes the desktop integration and Z: drive symlinks and is not a true sandbox. It protects against errors rather than malice. It's useful for, e.g., keeping games from saving their settings in random subdirectories of your home directory.

If you want to mitigate the possibility of running malicious code, there are two options. You need to properly sandbox the application, either in a virtual machine (not viable for modern video games), or a sandbox layer akin to bubblewrap. It does appear that Bottles does this via FlatPak, but I do not know if this is something which is always activated, or if it is an optional feature. The other option, which is not fool-proof, is to scan the files using a tool like ClamAV.

[–] riseuppikmin@hexbear.net 2 points 11 hours ago

Bottles sandboxing is done by turning on experimental sand boxing somewhere in settings. It does mean you'll have to copy any installers into the c_drive of that bottle to execute. You can also optionally remove networking from a bottle (I do this for all singleplayer games)

[–] stupid_asshole69@hexbear.net 9 points 1 day ago

No less safe than anything else I reckon.

[–] lurkerlady@hexbear.net 13 points 1 day ago* (last edited 1 day ago) (2 children)

Its absurdly safe, they are basically their own containers (can't read outside of the container, sandboxed) and if you have bottles installed as a flatpak that is also a container. Linux also doesnt give easy root access to programs, so they can't do much damage. Most malware targets Windows, MacOS, and server side Linux. Due to how containerized most linux distros are, they avoid targeting linux desktop users.

[–] Edie@hexbear.net 18 points 1 day ago

Wine does not sandbox in any way at all. When run under Wine, a Windows app can do anything your user can. Wine does not (and cannot) stop a Windows app directly making native syscalls, messing with your files, altering your startup scripts, or doing other nasty things.
You need to use AppArmor, SELinux or some type of virtual machine if you want to properly sandbox Windows apps.
Note that the winetricks sandbox verb merely removes the desktop integration and Z: drive symlinks and is not a true sandbox. It protects against errors rather than malice. It's useful for, e.g., keeping games from saving their settings in random subdirectories of your home directory.

[–] dannoffs@hexbear.net 9 points 1 day ago

Due to how containerized most linux distros are, they avoid targeting linux desktop users.

What? Most desktop linux installs only have a few programs in containers. I think the only "containerized" thing I have on my system is the steam flatpak. It is growing in desktop use but containerization is much more of a server side thing.

[–] dannoffs@hexbear.net 12 points 1 day ago (1 children)

Tell your friend it's much safer than running those same pirated games on Windows.

[–] Dirt_Owl@hexbear.net 10 points 1 day ago* (last edited 1 day ago) (2 children)

As I understand it, bottles/wine is a virtual machine, right? So there's no way anything in the bottle could interact with anything outside of the virtual windows drive it's created?

[–] dannoffs@hexbear.net 13 points 1 day ago (3 children)

Wine and bottles by extension aren't virtual machines, its a compatibility layer that translates windows system calls into Linux ones. Programs run in wine can interact with files on your system if you run them outside of a prefix. You can think of a prefix as an individual isolated machine that Windows software run in it can't see out of kind of like a VM but what the software is doing behind it is completely different. It's almost certainly not going to happen unless you're being directly attacked, but it is theoretically easier for malware to escape a prefix than a VM.

The main benefit of prefixes is having multiple different ones that can be tweaked for better compatibility with the game or whatever you're trying to run. Bottles is just an easy way to manage prefixes.

[–] CarbonScored@hexbear.net 10 points 1 day ago* (last edited 1 day ago)

It's easy to remember that Wine is just an API compatibility layer - Just gotta know its actual name:

  • W - Wine
  • I - Is
  • N - Not (an)
  • E - Emulator
[–] Dirt_Owl@hexbear.net 11 points 1 day ago
[–] Robert_Kennedy_Jr@hexbear.net 11 points 1 day ago* (last edited 1 day ago) (1 children)
[–] Dirt_Owl@hexbear.net 8 points 1 day ago

Oh! No wonder it uses less resources than a virtual machine.