Plot twist: Theres still hackers in multiplayer even with all that crap plus rootkit they bundle with.
What game is this? so I know what company to never buy from again.
Submitted 19 hours ago by Smokeydope@lemmy.world to mildlyinfuriating@lemmy.world
https://lemmy.world/pictrs/image/5469cc90-d2cc-4d2d-ad3c-188f748c6d85.png
Plot twist: Theres still hackers in multiplayer even with all that crap plus rootkit they bundle with.
What game is this? so I know what company to never buy from again.
Call Of Duty Black Ops 7, however im hearing Battlefield 6 is also in the same boat.
Want some nostalgia? Plutonium for Black Ops 2 is still relatively alive with a crap ton of modded servers. Game is still fun to play.
Battlefield 6 by EA, which is now privately owned by the Saudi Arabia Public Investment Fund, Silver Lake and Affinity Partners
You mean if I play EA games I will be supporting a murderous regime that engaged in the largest terrorist attack on US soil resulting in the massive loss of our rights?
Oh darn, I guess I won’t be missing much.
I know all about EA’s sellout.
One that obviously isn’t worth playing.
Nice of Steam to warn you though.
They check the other requirements too, presumably
True
Just play an indie game, these games will only enshittify more and more.
Exactly, and you’ll save tons of money too. ETS2 goes on sale for $5, stardew valley for $7.50, vintage story doesn’t go on sale but it’s only $22. All games that are way more fun, way less buggy, and have way more replay value than every piece of triple a junk i’ve played
“enshittification” and it’s toggling two things in the BIOS, with one of them being literally required already by Windows 11, and the other being important for security to the point it should be toggled on anyways.
the tpm does not add any security whatsoever for windows 11, and secure boot is being used to lock your control out of your own system. secure boot enabled with machine owner keys wouldn’t be enough either for these games
Literally NOT “required” by Windows 11. You can install 11 without TPM2 support just fine.
Lmfao at this one dude literally losing his shit and defending this repeatedly in the comments like a fucking Microsoft white knight
He once got killed by a hacker and lost all his marbles.
What game is it? Name and shame.
Black Ops 7. Its got plenty of shaming going on for other reasons already but this is the first time ive seen this message.
Does it? Other than the campaign being kinda ass and a bunch of assets being AI I don’t think there’s much to complain about this game. The matchmaking is old school, lobbies don’t disband, and the gameplay on MP is solid.
battlefield 6 does this, among others
Embark has been killing it. The Finals and Arc Raiders have been filling my multiplayer needs.
Those “features” are not about security. They’re about uniquely identifying the system without using, “personally identifiable information”.
Is everyone in this fucking thread a Twitter-level schizophrenic??? What are ya’ll even saying. Please get some tech literacy.
Ironic comment
This was funny to read, can’t deny ur right
The games that require secure boot/tpm already are installing kernel level “malware” so they can do much more with that than they can by knowing if you have tpm or not (which you do because you are playing, so 100% of their userbase will have it).
Yeah I dont need to play any game that requires my to allow spyware.
I just won’t play such games. Simple as.
i wonder, is there a good way to simulate that?
Welp, vote with your wallet. Money is the only thing these companies understand.
the problem is that the overwhelming majority of gamers are short sighted little gremlins who need constant access to new shiny to feel validated.
Sure, they come on the internet to yell and scream about the horrid injustice of it all, but the second the vile evil company that they’ll never again support releases their next game… they are at gamestop preordering the 800 dollar super legendary edition.
There are people who actually do follow through, I am one of them… There are several companies on my shit list that I will never buy from again, and in over a decade have not bought from them. . . but people that actually follow through on it are too rare to make a difference.
A lot of gamers tend to also be teenagers/young adults who just want to play a game with their friends in their social group. I was a kid once too after all so its understandable. However its the “just want to play with my friends” crowd that enables the industries worst practices by being consumers who think of yearly video game release hype cycles as vehicles of social interaction instead of caring about games as an art form thats being slowly degraded by corporate cuckery over time.
You are fighting the LORD’s cause, sir, the LORD’s.
You say this as if we weren’t inside a big echo chamber of turbonerds right now. Everyone here already knows it. The actual way is to convince your less tech inclined friends and family.
I hate the idea of software/hardware that can prove that the user does not have control over it so much
That’s what’s pissing me off. People still cheat. It’s not that they have these invasive and stupid ways of anti cheats, but at least they work.
That’s why even I was on Windows, I would avoid Kernel level anticheat.
I know anticheat is important but I wish there was ways to prevent cheaters without running stuff in lower rings.
Microsoft just needs to start kicking shit out of the Kernel. Allowing any of it is inherently insecure on a fundamental level.
They are.
Kernel level drivers with known security vulnerabilities are blocked from loading in Windows 11.
This is functionality of the core isolation / memory integrity protection, which rely on Secure Boot and TPM to function.
They won’t, at least not for a very long time, because they deeply resist breaking changes, even when they are a net benefit.
I think they are working towards getting everything out of the kernel though, ever since that Crowdstrike outage.
True
Would be nice to play a game without providing my DNA.
I told you so. You called me paranoid. I said so. Now lookatyou.
Secure Boot and TPM do NOT run anything in the lower rings, ffs. It’s literally a security true/false check.
who said they do?
There’s plenty of options. Many desktop mobos and CPUs support TPM2 through bios or firmware updates. Other desktop mobos have TPM headers and the modules go for $12-$30, but you have to track down the specific module compatible with your mobo as there is no standard pinout, even within the same manufacturer. There’s also one PCIE TPM2 card I found, but it’s from a company I don’t recognize and their site has no purchase button, just “contact us”, so that doesnct check out as legit to me.
Lastly, TPM2 has been a standard since 2015, with most manufacturers including it starting in 2016. At some point you have to accept that certain experiences will be unavailable to you without upgraded hardware. 10 years out of a computer before you start hitting hard limitations like this is a fucking great amount of life out of it.
It’s more unusual than anything. TPM2 and Secure boot are requirements I would expect from a security compliance checklist and software handling at least somewhat valuable data, like maybe a password vault.
A steam game is the last place I would expect this.
Once you delve into the technical parts of it, it’s actually not that unusual. I wrote more detail in another comment on this post, but the TLDR of it is that Secure Boot is meant to enforce the integrity of the boot procedure to ensure that only approved code runs before the Windows kernel gets control, and the TPM 2.0 is meant to attest to that. Together, they make it possible for anticheat to tell if something tried to rootkit Windows to evade detection.
Especially unusual bc there are kernel level anticheats that work just fine without it
It is for the anti-cheat, it seems, and for the case of BO7 it seems to actually have worked this time. I haven’t seen a hacker at all.
“There are alternatives! You don’t *have to* own slaves, it’s just an option!”
You’re literally fucking comparing slavery to toggling two fucking things on the BIOS? What the fuck is wrong with you?
Nah fuck that, you gotta go. Image
start going down the technical path with Linux to extend the life further.
linux won’t fix this kind of shit, because this is about an arbitrary limitation of wanting to lock the owner out of the system. these malware companies won’t ever recognize a free linux setup as “verified”
The fact you’re getting downvoted is absurd. Mfs really want to play a MODERN TRIPLE A game like Battlefield 6 or Black Ops 7 with hardware from 2014!! You can literally go on used marketplaces and get stuff from like 2018-2019 that would run those games well enough! Hell, I’m pretty damn poor and I live in a country with terrible electronics taxes, and I still managed to get myself upgraded to semi-modern hardware by buying used!
We want to do it without providing a fucking urine sample ok
rofl you think a newer system is actually necessary? What a cucky bitchboi opinion…
Bro… There is no excuse to have a computer from 2014 anymore for GAMES unless you only want to do light stuff/emulators on it. Like, man, just search on used marketplaces, a B350/B450 motherboard for Ryzen processors costs less than 50 bucks there and they all have TPM capabilities, and you can get a R5 3600 for like 50 bucks 😭
Missing the fucking point- you should not give up absolute control of your machine at the lowest level to play a shit game
Secure Boot and TPM are literally two fucking hash checks on boot. Ya’ll kids really fucking need some technological literacy.
You are missing the point entirely. This shit should not be required to play a fucking video game.
You’re supposed to have both on anyways regardless of a game requiring it or not.
Sorry to see the downvotes buddy, people are cult-ish. You aren’t wrong.
The entire idea of Secure Boot is to verify the boot chain using signature checks to ensure that nothing “unauthorized” runs in the boot process before control is handed off to the kernel. It’s meant to stop lower bootloader stages from silently modifying or hooking later stages.
In theory, it’s supposed to stop rootkits from being able to exist above the OS, hiding themselves while stealing information or influencing programs. In practice, there’s a shit load of badly implemented EFI programs and bootloaders that are signed and later turned out to be vectors for arbitrary code execution (this is why you need the DBX list to be updated frequently).
Cynically, Microsoft probably came up with Secure Boot because that whole rootkit-and-fuck-with-the-kernel thing used to be one of the ways people cracked Windows 7.
As for TPM 2.0, the whole point of it being used for anticheat is because it stores an immutable log of the Secure Boot process and attests to the integrity of the system. If I installed my own Secure Boot certificates and rootkitted Windows for the sole purpose of cheating, the TPM would see that a self-signed executable was used during boot and refuse to say the system was unmodified.
You are downvoted for your first part. Nobody is dog piling or being cultish, the person is just being a moron.
We know why they might be used, we just dont want video games demanding shit we dont actually need.
Doesnt help the OP is claiming to be an “unemployed artist from Brazil” who writes like an unemployed gas station clerk from Tennessee.
MonkderVierte@lemmy.zip 3 hours ago
Welp, doesn’t run in proton. Next on the list…