You are missing the point entirely. This shit should not be required to play a fucking video game.
SalamenceFury@lemmy.world 23 hours ago
Bro… There is no excuse to have a computer from 2014 anymore for GAMES unless you only want to do light stuff/emulators on it. Like, man, just search on used marketplaces, a B350/B450 motherboard for Ryzen processors costs less than 50 bucks there and they all have TPM capabilities, and you can get a R5 3600 for like 50 bucks 😭
warm@kbin.earth 23 hours ago
SalamenceFury@lemmy.world 21 hours ago
You’re supposed to have both on anyways regardless of a game requiring it or not.
warm@kbin.earth 10 hours ago
Not at all. PCs do and have functioned without, forever.
WhyJiffie@sh.itjust.works 8 hours ago
TPM is enterprise functionality, useless for most consumers.
Secure Boot is not enough for these malware. They want SB rooted in MS keys. You using a Machine Owner Key? Too bad, go away! they say
MonkderVierte@lemmy.zip 7 hours ago
Uh, no.
pivot_root@lemmy.world 18 hours ago
Sorry to see the downvotes buddy, people are cult-ish. You aren’t wrong.
The entire idea of Secure Boot is to verify the boot chain using signature checks to ensure that nothing “unauthorized” runs in the boot process before control is handed off to the kernel. It’s meant to stop lower bootloader stages from silently modifying or hooking later stages.
In theory, it’s supposed to stop rootkits from being able to exist above the OS, hiding themselves while stealing information or influencing programs. In practice, there’s a shit load of badly implemented EFI programs and bootloaders that are signed and later turned out to be vectors for arbitrary code execution (this is why you need the DBX list to be updated frequently).
Cynically, Microsoft probably came up with Secure Boot because that whole rootkit-and-fuck-with-the-kernel thing used to be one of the ways people cracked Windows 7.
As for TPM 2.0, the whole point of it being used for anticheat is because it stores an immutable log of the Secure Boot process and attests to the integrity of the system. If I installed my own Secure Boot certificates and rootkitted Windows for the sole purpose of cheating, the TPM would see that a self-signed executable was used during boot and refuse to say the system was unmodified.
warm@kbin.earth 10 hours ago
You are downvoted for your first part. Nobody is dog piling or being cultish, the person is just being a moron.
We know why they might be used, we just dont want video games demanding shit we dont actually need.
pivot_root@lemmy.world 3 hours ago
Oh, the comment I directly replied to is absolutely justified in its downvotes. I actually meant to reply to a different comment of theirs.
There’s a lot of FUD and disinformation around Secure Boot and TPM 2.0 in general. When it comes to anticheat and requirements ewquie3m, people are dog piling. The comments being cynical or exaggerating the security risk of the TPM to the user are getting more upvotes, while the comments that disagree with those are getting pushback.
kinther@lemmy.world 9 hours ago
Doesnt help the OP is claiming to be an “unemployed artist from Brazil” who writes like an unemployed gas station clerk from Tennessee.
tomiant@piefed.social 23 hours ago
Missing the fucking point- you should not give up absolute control of your machine at the lowest level to play a shit game
SalamenceFury@lemmy.world 23 hours ago
Secure Boot and TPM are literally two fucking hash checks on boot. Ya’ll kids really fucking need some technological literacy.
real_squids@sopuli.xyz 22 hours ago
Are you dense? This is about it’s anticheat, the reason for requiring TPM.
SalamenceFury@lemmy.world 20 hours ago
Sorry, I’m not the one having a literal toddler-like meltdown cause a game asked for two hardware requirements you can fix in 15 seconds, and if you really don’t want to, don’t fucking buy or play it. Dunce.
tomiant@piefed.social 7 hours ago
I’m like, a sysadmin of 30 years…