this post was submitted on 15 Aug 2023
-32 points (16.7% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54565 readers
454 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

Alright guys, so this is a guide on how to cheat in Minecraft 1.8.(8/9) safely whilst using cracks, and without getting ratted.

Firstly, choose a reputable site, such as Masterof13fps, and download cracks from reputable community members, such as Exeos.

Another thing to consider is that you should pick cracks of known but not generally very hard to crack clients, and prefer ones that got their sources leaked, so that you can check the code yourself, and preferably compile it yourself. One thing you should look out for is fake cracks, or ratted ones, so make sure to check all the “comments” in the forum post before downloading the crack. I also prefer using free clients such as LiquidBounce, since they're mostly superior to cracked paid clients.

you are viewing a single comment's thread
view the rest of the comments
[–] themagzuz@lemmy.blahaj.zone 3 points 1 year ago (1 children)

not necessarily. there are servers with no rules, like 2b2t where hacking is pretty much required because everyone else does so. interestingly, this means that the pvp actually loops back to being really deep and complex

[–] buckykat@lemmy.blahaj.zone 2 points 1 year ago (1 children)

Why then would OP be concerned about being caught?

[–] themagzuz@lemmy.blahaj.zone 3 points 1 year ago

getting ratted isn't getting caught. a RAT is a remote access tool, which is commonly included as a trojan in order to give a hacker remote control of a victims pc