This guy tested an R2R keygen file...

Discussion in 'Lounge' started by InFiNiGhTe, Oct 24, 2025 at 6:03 PM.

  1. Hazen

    Hazen Rock Star

    Joined:
    Dec 28, 2016
    Messages:
    728
    Likes Received:
    433
    "Log keystrokes" is something I wouldn't want on my machine.

    I have Malwarebytes and checking the R2R Ableton keygen it is being flagged as malware. Malwarebytes has the reputation of being quite accurate.

    It's well worth investigating this issue further, even though I keep my personal files and work totally separate from my audio / music things.

    Also, I would be curious for "legit" audio software to be looked into. For example, without wanting to go into politics, there is a very prominent audio software company, that is based in a country infamous, among other things, for beinbg heavily invested into "cyber security" (to put it euphemistically). Can we rest assured that no unwanted functions are being installed with this software and it's plugin "shells"?
     
  2. PulseWave

    PulseWave Audiosexual

    Joined:
    May 4, 2025
    Messages:
    2,317
    Likes Received:
    1,295
    In my opinion, the safest thing is the downloads and the control of the sister site, so that every uploader and cracker can completely ruin their business model with keygens that call home or, as you describe, record keystrokes in the finest secret service manner.
     
  3. Hazen

    Hazen Rock Star

    Joined:
    Dec 28, 2016
    Messages:
    728
    Likes Received:
    433
    No, please let us not become like KVR or GS, where relevant and free debates are being undermined by the agenda of the admins (in that case submission to the will of advertisers / plugin companies).
     
    • Agree Agree x 4
    • Disagree Disagree x 1
    • List
  4. Crinklebumps

    Crinklebumps Audiosexual

    Joined:
    Nov 1, 2017
    Messages:
    1,213
    Likes Received:
    866
    Location:
    UK
    The safest way would be for R2R to supply their keygens separate to the software from their own hosted server with a unique web address. We can then verify that the keygen is coming directly from them with nobody inbetween at any stage.
     
    • Interesting Interesting x 1
    • List
  5. shinyzen

    shinyzen Audiosexual

    Joined:
    Sep 28, 2023
    Messages:
    1,289
    Likes Received:
    786
    It already happens to some degree, most of the time warranted though. Overall its a safe space for debate here, very little censorship, the mods do a good job.
     
  6. muse2love

    muse2love Producer

    Joined:
    Nov 11, 2013
    Messages:
    270
    Likes Received:
    132
    Location:
    Montréal
    stop wasting your time investigating fake black holes and do music to show your gratitude for r2r

    the key fits without the heist of malicious and stupid people who can't enjoy themselves nor music but just pretend to win you as their zombie friends

    no... go away fake peeploids

    zealots....etc.... go away leave us alone
     
  7. horst

    horst Member

    Joined:
    May 10, 2024
    Messages:
    35
    Likes Received:
    11
    Location:
    Riva
    first and foremost: R2R could actually be seen as a security group.

    see it this way: there are companies hacking and whatnot, to let other companies know where they have flaws and holes.

    R2R morphed from a beginner kru to a force being above devs. they tell devs where they screw up, when they add bullshit, they inject own code to fix bugs which devs ignore or aren't even able to figure out.

    AND!!!

    they inform and let the devs and community KNOW about the bugs, screw ups, bloating and whatnot.

    and you really think R2R would go ahead and sneak behind anyone to stab a dagger in their back by injecting a fucking keylogger?
    what is the purpose?? what benefit would they have?

    they can reverse whatever the fuq they want, if they wanna go rogue.. but they aren't. they are white witches.. come on, eh.

    screw them clickbait vids. a*al-pl*g masturbate + simps are just hunting for clicks!
     
  8. MrLyannMusic

    MrLyannMusic Audiosexual

    Joined:
    Jan 31, 2014
    Messages:
    1,328
    Likes Received:
    672
    Location:
    Tunis, Tunisia
    new fear unlocked R²R going rogue :rofl:
     
  9. slowpoke

    slowpoke Kapellmeister

    Joined:
    Feb 26, 2021
    Messages:
    193
    Likes Received:
    74
    If the R2R keylogger blocks the Microsoft one, i'm good with it.
     
  10. clone

    clone Audiosexual

    Joined:
    Feb 5, 2021
    Messages:
    9,298
    Likes Received:
    4,066
    This is completely incorrect. A "researcher" cannot reverse engineer something, penetration tester cannot do security audits, or anything of the sort; illegally/unauthorized first, and then ask for a "Get out of jail free card" after the fact. That is simply not the way it works. Ever.
     
  11. horst

    horst Member

    Joined:
    May 10, 2024
    Messages:
    35
    Likes Received:
    11
    Location:
    Riva
    ofc they aren't doing it without letting their "victims" know about it or without a contract. but there are these companies finding holes and vulnerabilities.
    atleast that's what i heard.

     
  12. saccamano

    saccamano Audiosexual

    Joined:
    Mar 26, 2023
    Messages:
    1,860
    Likes Received:
    811
    Location:
    CBGB omfug
    Tell THAT, to the NSA... See how far you get. :rofl:

    Amazed to still see this wanker thread still being here. Figured it would have shot itself in the head a long time ago from sheer absurdity. The tall tales are getting taller as the shadows grow longer, and the credibility seeps from conversation. Apparently "ap masturbating" really did get to all of you at the end of the day, innit... pffft.
     
    Last edited: Oct 25, 2025 at 9:31 PM
    • Funny Funny x 2
    • Agree Agree x 1
    • List
  13. Synclavier

    Synclavier Audiosexual

    Joined:
    Nov 28, 2014
    Messages:
    963
    Likes Received:
    629


    try checking Capa on Virustotal it will be also recognized as malware :)
     
    • Funny Funny x 1
    • Interesting Interesting x 1
    • List
  14. Riddim Machine

    Riddim Machine Audiosexual

    Joined:
    Jul 3, 2021
    Messages:
    794
    Likes Received:
    668
    Location:
    Sierra Fox
    This rabbit hole is full of s*. I'm amazed some guys are still digging more.
     
  15. Pagurida

    Pagurida Platinum Record

    Joined:
    Nov 30, 2012
    Messages:
    214
    Likes Received:
    154
    Location:
    Brain
    Take a look at the rules that Capa uses for its analyses (https://github.com/mandiant/capa-rules/tree/master/collection/keylog) and you'll see how absurd, baseless and ridiculous that disaster movie by this so called “Mr. Talentino” :rofl: really is.
    Log keystrokes – OMG!!!! :woot: :crazy::suicide:

    Inevitably, a program has to monitor whether the user presses a key on the keyboard in order to get the info about that keystroke for further processing. Almost all programs do that, even keygens! Just for fun, check some of your most trusted, frequently used apps with Capa and you'll be surprised at what they're up to. :(
    But don't panic - that's a far cry from malicious keylogging in the sense of [threatening voice] “I'll record ALL your keystrokes EVERYWHERE and ALWAYS and send them straight to my place, so I can hack into your online banking, email account etc., har, har, har, ...”
    CONCLUSION: "16 tons" for this monkey business... :trashing:
     
Loading...
Loading...