Modern kernel anti-cheat systems are, without exaggeration, among the most sophisticated pieces of software running on consumer Windows machines. They operate at the highest privilege level available to software, they intercept kernel callbacks that were designed for legitimate security products, they scan memory structures that most programmers never touch in their entire careers, and they do all of this transparently while a game is running. If you have ever wondered how BattlEye actually catches a cheat, or why Vanguard insists on loading before Windows boots, or what it means for a PCIe DMA device to bypass every single one of these protections, this post is for you.

  • JohnWorks@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    9
    ·
    14 hours ago

    Can games be designed to have server side/server authority anti cheat? Or is the user’s computer always going to have the ability to cheat in a game.

    • Eheran@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      10 hours ago

      Server side protection for example only sends info where someone else is when you could actually see them. However this also means legit players see people suddenly appearing.