- cross-posted to:
- technology@lemmy.zip
- cross-posted to:
- technology@lemmy.zip
Company promises countermeasures against new DRM bypasses — zero-day game releases become norm as security concerns mount over hypervisor-based bypass
Company promises countermeasures against new DRM bypasses — zero-day game releases become norm as security concerns mount over hypervisor-based bypass
This seems like a bad faith argument, the crack is basically installing a rootkit in your system. Its fair to assume a lot of casual users will be as ignorant as you are about the security issues and not re-enable the features.
If you truly can’t see why that might be worse then DRM installed in a game your a fool.
So is denuvo.
I trust the random cracker’s rootkit more than denuvo’s.
Potential evil is less risky than proven, official, completely intentional evil.
Still, I have no interest in playing games infected with this shit. Their developers have evidently no interest in making good or even playable games, or they wouldn’t infect them with this performance and usability killing malware, so to the blacklist they and their whole publisher go, cracked or not.
If it’s a question of installing a rootkit belonging to either the evil pirates who are closer to my kind of evil, or evil corporations who are literally destroying the internet, civilization, and the world in order to masturbate in their AI training gulags with my personal data? I’d choose to trust the pirates every time.
That said, if I have to install a rootkit from anyone to play a fucking game, I’m probably just not playing that fucking game.
That’s assuming they’re just pirates, not state actors or hackers taking advantage of it. Still though, Denuvo is possibly assisting state actors too, so 🤷. The ideal solutions is just don’t play games with Denuvo. It’s not that difficult.
Are you familiar with how denuvo works? It is also a literal root kit. Yes it doesn’t run on ring -1, but it is ring 0.
As is denuvo.
Well… Nothing new then.
https://discuss.techlore.tech/t/psa-eac-apex-legends-anti-cheat-vulnerability/7768
https://arxiv.org/html/2408.00500v1
Could a kind soul repipe all that garbage JavaScript escape code for:
<discourse-assets-json> <div class="hidden" id="data-preloaded" data-preloaded="{"topic_7768":"{\"post_streamto markdown, Creole, or Org?
…do you not use JavaScript?
I prefer actual Unicode 17.
Based if true
Ok, I’ll play the fool. Why is it worse? Is there some reason I should trust irdeto more than a guy in a hoodie?
There is a reason, if it’s just some guy in a hoodie. If it’s a known cracker with a reputation for good cracks, it’s probably fine. Some random person? I’d avoid it. I’d probably avoid it either way, but I agree there’s no reason to trust the company either. Just don’t trust either.