Kernel Level Anti-Cheats
❗Article Status Notice: This Article is a stub
This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Issues may include:
- This article needs to be expanded to provide meaningful information
- This article requires additional verifiable evidence to demonstrate systemic impact
- More documentation is needed to establish how this reflects broader consumer protection concerns
- The connection between individual incidents and company-wide practices needs to be better established
- The article is simply too short, and lacks sufficient content
How you can help:
- Add documented examples with verifiable sources
- Provide evidence of similar incidents affecting other consumers
- Include relevant company policies or communications that demonstrate systemic practices
- Link to credible reporting that covers these issues
- Flesh out the article with relevant information
This notice will be removed once the article is sufficiently developed. Once you believe the article is ready to have its notice removed, visit the Discord (join here) and post to the #appeals
channel, or mention its status on the article's talk page.
Kernel Level Anti-Cheats are anti-cheat software that boot and run at the kernel level instead of the typical user level. These methods of anti-cheats have recently become more popular among big online service games. They are controversial because of privacy and security concerns.
How it works[edit | edit source]
Why it is a problem[edit | edit source]
Privacy Concerns[edit | edit source]
lorem ipsum
Security Concerns[edit | edit source]
Kernel level anti-cheats run at the kernel level, the deepest and most authoritative level of the computer. They are software that have access to everything the computer is doing. This is in contrast to traditional, user level anti-cheats, which only had access to user-level permissions and therefore could not detect certain cheat engines which were cleverly hidden. However, since Kernel Level anti-cheats are at the kernel level, if they can be hijacked and exploited, they create a massive security issue at the kernel level. This has happened with Genshin Impact. Hackers hijacked the anti-cheat and delivered ransomware.[1]
Examples[edit | edit source]
- EA has recently moved to Kernel Level Anti-Cheats.
- GTA V has recently moved to Kernel Level Anti-Cheats.
- Genshin Impact has moved to Kernel Level Anti-Cheats.
References[edit | edit source]
- ↑ Soliven, Ryan; Kimura, Hitomi (2022-08-24). "Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus".