UPX is open source and works on linux , windows and mac (ie. cross platform) I would like to know why the torrenting space isn’t using it already / having a mature discussion about it.
Pack what executables exactly?
Like take a copy of Nodobe Notoshop and repack it?
If that’s what you mean, uh, politely, but fuck no. Malware is enough of a problem that there’s no way I’d want to start downloading crap that’s been UPXed since that’s going to make it impossible to determine if it’s legitimate or not by (most) endpoint tools, or they’ll just see UPX and go ‘bad shit!’ on everything.
What do you actually mean?
Do you scan for torrents using some endpoint tools ?
Sorry, I meant antivirus. (Corpo IT calls it endpoint, since it’s, well, the endpoint.)
. Malware is enough of a problem that there’s no way I’d want to start downloading crap that’s been UPXed since that’s going to make it impossible to determine if it’s legitimate or not by (most) endpoint tools, or they’ll just see UPX and go ‘bad shit!’ on everything.
You had clearly misunderstood what this tool is. Its tool for better compression of executables which could be used in data sensitive (Like , most people would agree with me that some times decrypting on our own local device could be better since it could be more predictable than waiting for seeders , because there are very less seeders)
Politely, but no.
It’s a compression tool that is also used to mask malware, and you’re proposing to expand it’s use in a use case that’s ALREADY coated in enough malware to give you herpes just by walking past your average tracker.
It’s a bad idea from a security perspective, and it’s not going to outperform a LZMA-based compression tool using a large dictionary (7zip, etc.) which also isn’t fucking with binaries in a way that makes detecting and preventing malicious software more complicated for the average user, who typically knows absolutely zero about what’s going on.
I had actually agreed with you , here was my initial comment , though I just wanted to look into upx github page more
okay now I understand what you mean. Basically the same threat model follows if you want to unpack a upx and it also states - We will *NOT* add any sort of protection and/or encryption. This only gives people a false feeling of security because all "protectors" can be broken by definition. What would you recommend instead ? . But also if you are extracting that file , you are basically running it , but the main issue is that antivirus can't read it
new response:
But on https://upx.github.io/ , its given as >secure: as UPX is documented Open Source since many years any relevant Security/Antivirus software is able to peek inside UPX compressed apps to verify them I am really sorry mate but please read about upx once because I don't know why but you just seem so defensive to this change without actually giving any good reason. Though you do seem knowledgable so I am obviously looking to have more discussion , but just a bit more detailed. Thanks , have a good day / good night
well then you could still extract it using upx , (basically if I remember correctly , you use upx on one exe file to generate another (I think this is the intended use case of what I am suggesting) & then use antivirus on that. according to their website you can list, test and unpack your executables. Also, a checksum of both the compressed and uncompressed file is maintained internally.
Maybe present what it’s for and why you think it should be used? To me, you just proposed a random tool and just shared a link. Sorry dude, I ain’t reading all that.
Okay I have edited it to give more of my side. And not sure why you linked Anti Commercial AI license , I am not a bot .
It’s the digital equivalent of those sovereign citizens who think the people in charge give a fuck what they think. It makes them feel better.
It’s a licensing statement. Their post is CC-licensed.
Okay agreed.
The executable being packed in an executable format means it has to be decompressed on each launch. If it doesn’t it means it’s not saving any space anyway.
I don’t know what packing you’re looking for, but Windows applications are typically installed with installers. An executable compressed executable goes against this; unless you want to pack installers.
Traditional file compression works well enough. People know to launch an msi or exe or read a README. Introducing non-standard tools is not necessarily a good idea, and certainly is not intuitive to users not already familiar with it.
Traditional file compression doesn’t work that well as compared to upx. Upx supports as much as 500 mb/s on any reasonable device (this is very comparable to https://github.com/mhx/dwarfs) , which is honestly insane.
What advantage does it have over existing methods? It’s great that it’s cross-platform, but so are zip files. And the content inside isn’t cross-platform, so I don’t think that ultimately adds anything.
I mean , I use linux but I can use wine to run the content inside , so in some sense “every content” is cross platform. I think it ultimately adds to better performance specifically for executable torrents in the long run over things like zip.
In what way?
We should use tiny spoons to drink water in communal spaces!
Is it faster than 7z or have better ratios?
yes I think it does indeed have better ratio than 7z with better speed , I think without the need of extraction.