DaMAgeCard SD Express card vulnerability leverages the privileged access that PCIe provides — bypasses traditional software-based security mechanisms
(www.tomshardware.com)
from BrikoX@lemmy.zip to cybersecurity@sh.itjust.works on 09 Dec 13:34
https://lemmy.zip/post/27708914
from BrikoX@lemmy.zip to cybersecurity@sh.itjust.works on 09 Dec 13:34
https://lemmy.zip/post/27708914
Sacrificing security in the name of fast data transfer speeds.
threaded - newest
Could this be used to fool anti-cheat / piracy measures?
If there are no IOMMUs involved, sounds like yeah.
The only cheating method that can’t be beaten reliably with any form of client side anti-cheat uses PCIe. The gaming PC gets a PCIe card that sends over data on RAM to a second PC over USB. That PC then turns all that data into useable info, and USBs it back to the gaming PC in the form of cheats/hacks.
I hope i got all that right, friend works in the industry and is studying this stuff. I can mostly keep up with all the things they tell me.
So much effort, just to cheat in a video game. I can't help but feel like those people could be doing something slightly more productive. Though I'm sure it's fun as a hobby.
I think it might be important. To send a message to the gamedevs that anti-cheat will never be fullproof, therefore maybe they should stop with this nonsense.
Anti-cheat stuff also affects piracy. Would make more sense that people are trying to bypass it because of that.
Until they find out about it and detect the PCIe device by hardware id and ban the cheater.
They even have cheats that connect to the DRAM slots to read character positions from RAM as a wallhack now. Those are still undetectable by anti-cheats, kernel level or otherwise. Only manual review of replays or reports of shooting the wall for half the round might make them suspicious.