<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ednovstormbrewer</id>
	<title>Consumer Rights Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ednovstormbrewer"/>
	<link rel="alternate" type="text/html" href="https://consumerrights.wiki/w/Special:Contributions/Ednovstormbrewer"/>
	<updated>2026-04-28T23:42:18Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Kernel_level_anti-cheats&amp;diff=16331</id>
		<title>Kernel level anti-cheats</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Kernel_level_anti-cheats&amp;diff=16331"/>
		<updated>2025-07-03T17:43:24Z</updated>

		<summary type="html">&lt;p&gt;Ednovstormbrewer: Revised short list under Further reading pertaining to Rainbow Six Siege&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Kernel-level anti-cheat&#039;&#039;&#039; is a subset of anti-cheat dedicated towards running above the user level. These types of anti-cheat, such as [[Easy Anti-Cheat|Easy Anticheat]] (EAC), have grown in popularity among large developers for their online multiplayer games.{{Citation needed}} &amp;lt;!-- A comprehensive list of KL-AC to flip through:&lt;br /&gt;
https://levvvel.com/games-with-kernel-level-anti-cheat-software/ --&amp;gt;Alongside this rise in popularity is increasing concern from both consumers regarding their privacy with the use of this software,{{Citation needed}} and from security professionals who recognize the significant risks of kernel-level software being breached.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
==How it works==&lt;br /&gt;
Kernel level anti-cheats run at the {{Wplink|Kernel (operating system)|kernel level}}; the deepest and most authoritative level of the computer. In layman&#039;s terms, this essentially means the software is capable of tracking every process occurring on a computer, and additionally exhibit control if necessary. Alternatives to kernel level anticheat include user level anticheat which runs as a standard process on the player&#039;s machine, and server side anticheat which leaves the user&#039;s machine untouched and solely operates on the game&#039;s servers. &lt;br /&gt;
&lt;br /&gt;
The arms race between hacking and anticheat software has seen hackers better able to circumvent user level anticheat in recent years, pushing more anticheat developers to demand kernel access from players and more developers to require use of a kernel anticheat to access their games.&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
===Privacy concerns===&lt;br /&gt;
Kernel-level anti-cheat has access to every process that runs on a computer, from a simple video running in the background, to processes that may be more private for the user. As this software is designed to run on startup,&amp;lt;ref&amp;gt;{{Cite web |last=Rigney |first=Ryan K. |date=23 Feb 2024 |title=The Gamers Do Not Understand Anti-Cheat |url=https://www.pushtotalk.gg/p/the-gamers-do-not-understand-anti-cheat |access-date=2025-06-10 |website=Push To Talk}}&amp;lt;/ref&amp;gt; this means even if the intended game the software was installed for is not currently running, it retains the capability to track the user&#039;s behaviors. This can range from gathering data that could be sold to advertisers to, if the software itself is hijacked by a malicious actor, the harvesting of sensitive personal information.&lt;br /&gt;
&lt;br /&gt;
===Security concerns===&lt;br /&gt;
As kernel-level software holds the highest authorization on the hardware of a user,&amp;lt;ref&amp;gt;{{Cite web |last=Litchfield |first=Ted |date=27 Feb 2024 |title=According to experts on kernel level anticheat, two things are abundantly clear: 1) It&#039;s not perfect and 2) It&#039;s not going anywhere |url=https://www.pcgamer.com/according-to-experts-on-kernel-level-anticheat-two-things-are-abundantly-clear-1-its-not-perfect-and-2-its-not-going-anywhere/ |url-status=live |archive-url=https://web.archive.org/web/20250406200223/https://www.pcgamer.com/according-to-experts-on-kernel-level-anticheat-two-things-are-abundantly-clear-1-its-not-perfect-and-2-its-not-going-anywhere/ |archive-date=2025-04-06 |access-date=2025-06-10 |website=PC Gamer}}&amp;lt;/ref&amp;gt; this is favorable towards malicious actors.&lt;br /&gt;
&lt;br /&gt;
If a malicious actor was to discover a security issue in a kernel level anti-cheat significant enough to allow them to hijack the software, they would be able to directly execute code at its level of access, allowing them to bypass security measures put in place by the {{Wplink|operating system}} and {{Wplink|Antivirus software|anti-virus software}}.&lt;br /&gt;
&lt;br /&gt;
This is not a purely hypothetical scenario; it has already taken place in an incident with the popular {{Wplink|Gacha game|gacha}} co-op adventure [[Genshin Impact|&#039;&#039;Genshin Impact&#039;&#039;]], where the game&#039;s anti-cheat &#039;&#039;&#039;mhyprot2.sys&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039; was hijacked by malicious actors to disable users&#039; anti-virus software, with the intent of distributing {{Wplink|ransomware}}.&amp;lt;ref&amp;gt;{{Cite web |last=Soliven |first=Ryan |last2=Kimura |first2=Hitomi |date=2022-08-24 |title=Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus |url=https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Another perfect example is Hotta Studios&#039; Tower of Fantasy game. Users have reported that the kernel-level anticheat &#039;ksophon_x64.sys&#039; has caused BSOD along with the DPC_WATCHDOG_VIOLATION. This incident occurs when the game is uninstalled, launched, closed, or even running before the new publisher Perfect World Games. As of now, since the update by the company, the file doesn&#039;t appear to exist in System32/drivers.&lt;br /&gt;
&lt;br /&gt;
==Further reading==&lt;br /&gt;
*[[Electronic Arts|EA]] has a history of using anti-cheats such as [[Easy anti-cheat|EAC]], and recently switched to [[EA moves to in-house kernel-level anti-cheat on PC after purchase|an in-house developed kernel-level anti-cheat]].&lt;br /&gt;
*[[Rockstar Games|Rockstar]]&#039;s &#039;&#039;Grand Theft Auto V&#039;&#039; [[GTA 5 moves to kernel-level anti-cheat on PC after purchase|moved to Kernel Level Anti-Cheats.]]&lt;br /&gt;
*[[Hoyoverse]]&#039;s [[Genshin Impact|&#039;&#039;Genshin Impact&#039;&#039;]] has used a kernel-level anti-cheat since launch.&lt;br /&gt;
*Riot Games&#039; Valorant uses an in house kernel-level anticheat called [https://support-valorant.riotgames.com/hc/en-us/articles/360046160933-What-is-Vanguard Vanguard]&lt;br /&gt;
*Kuro Games&#039; Wuthering Waves uses a kernel-level anticheat called ACE (Anti-Cheat Expert) since launch.&lt;br /&gt;
*Hotta Studios&#039; Tower of Fantasy&#039;s history of kernel-level anticheat caused BSOD and would stay even after uninstalling the game.&lt;br /&gt;
*Ubisoft uses BattlEye kernel-level anticheat for [https://r6fix.ubi.com/projects/RAINBOW6-SIEGE-LIVE/issues/LIVE-59642 Rainbow Six: Siege] which prevents Linux gamers from launching it even after paying for it.&lt;br /&gt;
*Arrowhead Game Studios&#039; Helldivers 2 uses a kernel-level anticheat called [https://www.reddit.com/r/Helldivers/comments/19dp2qw/helldivers_2_nprotect_gameguard_anticheat/ nProtect GameGuard].&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>Ednovstormbrewer</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Kernel_level_anti-cheats&amp;diff=16330</id>
		<title>Kernel level anti-cheats</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Kernel_level_anti-cheats&amp;diff=16330"/>
		<updated>2025-07-03T17:37:03Z</updated>

		<summary type="html">&lt;p&gt;Ednovstormbrewer: Revised last paragraph under Security concerns. Added links pertaining to kernel-level anticheats to Helldivers 2 and Rainbow Six Siege as an example of Linux gamers being unable to launch the game.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Kernel-level anti-cheat&#039;&#039;&#039; is a subset of anti-cheat dedicated towards running above the user level. These types of anti-cheat, such as [[Easy Anti-Cheat|Easy Anticheat]] (EAC), have grown in popularity among large developers for their online multiplayer games.{{Citation needed}} &amp;lt;!-- A comprehensive list of KL-AC to flip through:&lt;br /&gt;
https://levvvel.com/games-with-kernel-level-anti-cheat-software/ --&amp;gt;Alongside this rise in popularity is increasing concern from both consumers regarding their privacy with the use of this software,{{Citation needed}} and from security professionals who recognize the significant risks of kernel-level software being breached.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
==How it works==&lt;br /&gt;
Kernel level anti-cheats run at the {{Wplink|Kernel (operating system)|kernel level}}; the deepest and most authoritative level of the computer. In layman&#039;s terms, this essentially means the software is capable of tracking every process occurring on a computer, and additionally exhibit control if necessary. Alternatives to kernel level anticheat include user level anticheat which runs as a standard process on the player&#039;s machine, and server side anticheat which leaves the user&#039;s machine untouched and solely operates on the game&#039;s servers. &lt;br /&gt;
&lt;br /&gt;
The arms race between hacking and anticheat software has seen hackers better able to circumvent user level anticheat in recent years, pushing more anticheat developers to demand kernel access from players and more developers to require use of a kernel anticheat to access their games.&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
===Privacy concerns===&lt;br /&gt;
Kernel-level anti-cheat has access to every process that runs on a computer, from a simple video running in the background, to processes that may be more private for the user. As this software is designed to run on startup,&amp;lt;ref&amp;gt;{{Cite web |last=Rigney |first=Ryan K. |date=23 Feb 2024 |title=The Gamers Do Not Understand Anti-Cheat |url=https://www.pushtotalk.gg/p/the-gamers-do-not-understand-anti-cheat |access-date=2025-06-10 |website=Push To Talk}}&amp;lt;/ref&amp;gt; this means even if the intended game the software was installed for is not currently running, it retains the capability to track the user&#039;s behaviors. This can range from gathering data that could be sold to advertisers to, if the software itself is hijacked by a malicious actor, the harvesting of sensitive personal information.&lt;br /&gt;
&lt;br /&gt;
===Security concerns===&lt;br /&gt;
As kernel-level software holds the highest authorization on the hardware of a user,&amp;lt;ref&amp;gt;{{Cite web |last=Litchfield |first=Ted |date=27 Feb 2024 |title=According to experts on kernel level anticheat, two things are abundantly clear: 1) It&#039;s not perfect and 2) It&#039;s not going anywhere |url=https://www.pcgamer.com/according-to-experts-on-kernel-level-anticheat-two-things-are-abundantly-clear-1-its-not-perfect-and-2-its-not-going-anywhere/ |url-status=live |archive-url=https://web.archive.org/web/20250406200223/https://www.pcgamer.com/according-to-experts-on-kernel-level-anticheat-two-things-are-abundantly-clear-1-its-not-perfect-and-2-its-not-going-anywhere/ |archive-date=2025-04-06 |access-date=2025-06-10 |website=PC Gamer}}&amp;lt;/ref&amp;gt; this is favorable towards malicious actors.&lt;br /&gt;
&lt;br /&gt;
If a malicious actor was to discover a security issue in a kernel level anti-cheat significant enough to allow them to hijack the software, they would be able to directly execute code at its level of access, allowing them to bypass security measures put in place by the {{Wplink|operating system}} and {{Wplink|Antivirus software|anti-virus software}}.&lt;br /&gt;
&lt;br /&gt;
This is not a purely hypothetical scenario; it has already taken place in an incident with the popular {{Wplink|Gacha game|gacha}} co-op adventure [[Genshin Impact|&#039;&#039;Genshin Impact&#039;&#039;]], where the game&#039;s anti-cheat &#039;&#039;&#039;mhyprot2.sys&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039; was hijacked by malicious actors to disable users&#039; anti-virus software, with the intent of distributing {{Wplink|ransomware}}.&amp;lt;ref&amp;gt;{{Cite web |last=Soliven |first=Ryan |last2=Kimura |first2=Hitomi |date=2022-08-24 |title=Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus |url=https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Another perfect example is Hotta Studios&#039; Tower of Fantasy game. Users have reported that the kernel-level anticheat &#039;ksophon_x64.sys&#039; has caused BSOD along with the DPC_WATCHDOG_VIOLATION. This incident occurs when the game is uninstalled, launched, closed, or even running before the new publisher Perfect World Games. As of now, since the update by the company, the file doesn&#039;t appear to exist in System32/drivers.&lt;br /&gt;
&lt;br /&gt;
==Further reading==&lt;br /&gt;
*[[Electronic Arts|EA]] has a history of using anti-cheats such as [[Easy anti-cheat|EAC]], and recently switched to [[EA moves to in-house kernel-level anti-cheat on PC after purchase|an in-house developed kernel-level anti-cheat]].&lt;br /&gt;
*[[Rockstar Games|Rockstar]]&#039;s &#039;&#039;Grand Theft Auto V&#039;&#039; [[GTA 5 moves to kernel-level anti-cheat on PC after purchase|moved to Kernel Level Anti-Cheats.]]&lt;br /&gt;
*[[Hoyoverse]]&#039;s [[Genshin Impact|&#039;&#039;Genshin Impact&#039;&#039;]] has used a kernel-level anti-cheat since launch.&lt;br /&gt;
*Riot Games&#039; Valorant uses an in house kernel-level anticheat called [https://support-valorant.riotgames.com/hc/en-us/articles/360046160933-What-is-Vanguard Vanguard]&lt;br /&gt;
*Kuro Games&#039; Wuthering Waves uses a kernel-level anticheat called ACE (Anti-Cheat Expert) since launch.&lt;br /&gt;
*Hotta Studios&#039; Tower of Fantasy&#039;s history of kernel-level anticheat caused BSOD and would stay even after uninstalling the game.&lt;br /&gt;
*Ubisoft developer refused letting Linux gamers launch [https://r6fix.ubi.com/projects/RAINBOW6-SIEGE-LIVE/issues/LIVE-59642 Rainbow Six: Siege] due to kernel-level anticheat.&lt;br /&gt;
*Arrowhead Game Studios&#039; Helldivers 2 uses a kernel-level anticheat called [https://www.reddit.com/r/Helldivers/comments/19dp2qw/helldivers_2_nprotect_gameguard_anticheat/ nProtect GameGuard].&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>Ednovstormbrewer</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Kernel_level_anti-cheats&amp;diff=16281</id>
		<title>Kernel level anti-cheats</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Kernel_level_anti-cheats&amp;diff=16281"/>
		<updated>2025-07-02T19:17:01Z</updated>

		<summary type="html">&lt;p&gt;Ednovstormbrewer: /* Added another paragraph to Security Concerns to address history with Hotta Studios and more companies using kernel-level anticheats under Further reading */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Kernel-level anti-cheat&#039;&#039;&#039; is a subset of anti-cheat dedicated towards running above the user level. These types of anti-cheat, such as [[Easy Anti-Cheat|Easy Anticheat]] (EAC), have grown in popularity among large developers for their online multiplayer games.{{Citation needed}} &amp;lt;!-- A comprehensive list of KL-AC to flip through:&lt;br /&gt;
https://levvvel.com/games-with-kernel-level-anti-cheat-software/ --&amp;gt;Alongside this rise in popularity is increasing concern from both consumers regarding their privacy with the use of this software,{{Citation needed}} and from security professionals who recognize the significant risks of kernel-level software being breached.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
==How it works==&lt;br /&gt;
Kernel level anti-cheats run at the {{Wplink|Kernel (operating system)|kernel level}}; the deepest and most authoritative level of the computer. In layman&#039;s terms, this essentially means the software is capable of tracking every process occurring on a computer, and additionally exhibit control if necessary. Alternatives to kernel level anticheat include user level anticheat which runs as a standard process on the player&#039;s machine, and server side anticheat which leaves the user&#039;s machine untouched and solely operates on the game&#039;s servers. &lt;br /&gt;
&lt;br /&gt;
The arms race between hacking and anticheat software has seen hackers better able to circumvent user level anticheat in recent years, pushing more anticheat developers to demand kernel access from players and more developers to require use of a kernel anticheat to access their games.&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
===Privacy concerns===&lt;br /&gt;
Kernel-level anti-cheat has access to every process that runs on a computer, from a simple video running in the background, to processes that may be more private for the user. As this software is designed to run on startup,&amp;lt;ref&amp;gt;{{Cite web |last=Rigney |first=Ryan K. |date=23 Feb 2024 |title=The Gamers Do Not Understand Anti-Cheat |url=https://www.pushtotalk.gg/p/the-gamers-do-not-understand-anti-cheat |access-date=2025-06-10 |website=Push To Talk}}&amp;lt;/ref&amp;gt; this means even if the intended game the software was installed for is not currently running, it retains the capability to track the user&#039;s behaviors. This can range from gathering data that could be sold to advertisers to, if the software itself is hijacked by a malicious actor, the harvesting of sensitive personal information.&lt;br /&gt;
&lt;br /&gt;
===Security concerns===&lt;br /&gt;
As kernel-level software holds the highest authorization on the hardware of a user,&amp;lt;ref&amp;gt;{{Cite web |last=Litchfield |first=Ted |date=27 Feb 2024 |title=According to experts on kernel level anticheat, two things are abundantly clear: 1) It&#039;s not perfect and 2) It&#039;s not going anywhere |url=https://www.pcgamer.com/according-to-experts-on-kernel-level-anticheat-two-things-are-abundantly-clear-1-its-not-perfect-and-2-its-not-going-anywhere/ |url-status=live |archive-url=https://web.archive.org/web/20250406200223/https://www.pcgamer.com/according-to-experts-on-kernel-level-anticheat-two-things-are-abundantly-clear-1-its-not-perfect-and-2-its-not-going-anywhere/ |archive-date=2025-04-06 |access-date=2025-06-10 |website=PC Gamer}}&amp;lt;/ref&amp;gt; this is favorable towards malicious actors.&lt;br /&gt;
&lt;br /&gt;
If a malicious actor was to discover a security issue in a kernel level anti-cheat significant enough to allow them to hijack the software, they would be able to directly execute code at its level of access, allowing them to bypass security measures put in place by the {{Wplink|operating system}} and {{Wplink|Antivirus software|anti-virus software}}.&lt;br /&gt;
&lt;br /&gt;
This is not a purely hypothetical scenario; it has already taken place in an incident with the popular {{Wplink|Gacha game|gacha}} co-op adventure [[Genshin Impact|&#039;&#039;Genshin Impact&#039;&#039;]], where the game&#039;s anti-cheat &#039;&#039;&#039;mhyprot2.sys&#039;&#039;&amp;lt;nowiki/&amp;gt;&#039; was hijacked by malicious actors to disable users&#039; anti-virus software, with the intent of distributing {{Wplink|ransomware}}.&amp;lt;ref&amp;gt;{{Cite web |last=Soliven |first=Ryan |last2=Kimura |first2=Hitomi |date=2022-08-24 |title=Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus |url=https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Another perfect example is Hotta Studios&#039; Tower of Fantasy game. Users have reported that the kernel-level anticheat &#039;ksophon_x64.sys&#039; has caused BSOD along with the DPC_WATCHDOG_VIOLATION. This incidents occur when the game is uninstalled, launched, closed, or even running before the new publisher Perfect World Games. As of now, since the update by the company, the file doesn&#039;t appear to exist in System32/drivers.&lt;br /&gt;
&lt;br /&gt;
==Further reading==&lt;br /&gt;
*[[Electronic Arts|EA]] has a history of using anti-cheats such as [[Easy anti-cheat|EAC]], and recently switched to [[EA moves to in-house kernel-level anti-cheat on PC after purchase|an in-house developed kernel-level anti-cheat]].&lt;br /&gt;
*[[Rockstar Games|Rockstar]]&#039;s &#039;&#039;Grand Theft Auto V&#039;&#039; [[GTA 5 moves to kernel-level anti-cheat on PC after purchase|moved to Kernel Level Anti-Cheats.]]&lt;br /&gt;
*[[Hoyoverse]]&#039;s [[Genshin Impact|&#039;&#039;Genshin Impact&#039;&#039;]] has used a kernel-level anti-cheat since launch.&lt;br /&gt;
*Riot Games&#039; Valorant uses an in house kernel-level anticheat called [https://support-valorant.riotgames.com/hc/en-us/articles/360046160933-What-is-Vanguard Vanguard]&lt;br /&gt;
*Kuro Games&#039; Wuthering Waves uses a kernel-level anticheat called ACE (Anti-Cheat Expert) since launch.&lt;br /&gt;
*Hotta Studios&#039; Tower of Fantasy&#039;s history of kernel-level anticheat caused BSOD and would stay even after uninstalling the game. &lt;br /&gt;
*Some Windows games with kernel-level anticheat has prevented Linux users from launching even with Wine/Proton layer.&lt;br /&gt;
*Arrowhead Game Studios&#039; Helldivers 2 uses a kernel-level anticheat called nProtect GameGuard.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Common terms]]&lt;/div&gt;</summary>
		<author><name>Ednovstormbrewer</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Android&amp;diff=15196</id>
		<title>Android</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Android&amp;diff=15196"/>
		<updated>2025-06-10T15:32:46Z</updated>

		<summary type="html">&lt;p&gt;Ednovstormbrewer: /* References */ Revised&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
{{InfoboxProductLine&lt;br /&gt;
| Title = Android&lt;br /&gt;
| Release Year = 2003&lt;br /&gt;
| Product Type = Software&lt;br /&gt;
| In Production = Yes&lt;br /&gt;
| Official Website = https://android.com/&lt;br /&gt;
| Logo = Android Logo.png&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Android_(operating_system)|&#039;&#039;&#039;Android&#039;&#039;&#039;]] is an operating system developed and released by &#039;&#039;&#039;[[Google]]&#039;&#039;&#039; since 2005. It is based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen-based mobile devices such as smartphones and tablets, but is also used in smart TVs, cameras, in-car infotainment systems, etc.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
Google, as the developer of Android, has faced scrutiny over privacy concerns, short software support lifespans, patent disputes, and anti-competitive behaviors.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
Google encourages the use of their [https://developer.android.com/google/play/integrity/overview Play Integrity API], a mechanism for Android applications to detect whether they are running on a non-OEM version of Android. This is employed mostly to prevent users from running Android versions with anti-consumer features removed, i.e. ads and unconsented data collection. For example, the Android YouTube app which leverages the API to detect whether it has been patched to remove ads, in which case it will refuse to play back videos.&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
This is a list of all consumer protection incidents related to this software. Any incidents not mentioned here can be found in the [[:Category:{{PAGENAME}}|{{PAGENAME}} category]].&lt;br /&gt;
&lt;br /&gt;
===Data collection===&lt;br /&gt;
{{Main|Android Data Collection}}&lt;br /&gt;
Android mobile devices, even when minimally configured, collect and share with Google extensive user data with little options for opting-out, raising privacy concerns.&lt;br /&gt;
&lt;br /&gt;
===Android System Safety Core silent install===&lt;br /&gt;
{{Hatnote|Full article: [[Android System SafetyCore]]}}&lt;br /&gt;
In January 22, 2025, Google quietly rolled out Android System SafetyCore to all Android devices. The installation of the program neither informed consumers that it was installed, nor did it request consumers to install it onto their devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;OEM Locked Bootloaders&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Article:&#039;&#039; [[Motorola]]&lt;br /&gt;
&lt;br /&gt;
In North America, Many of Android devices like phones or tablets will not allow consumers to unlock and do what they want to modify the software. Therefore, it has been incredibly difficult and nearly impossible to root and install custom ROMs into the device unless an exploit has been found. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Ednovstormbrewer</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Android&amp;diff=15195</id>
		<title>Android</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Android&amp;diff=15195"/>
		<updated>2025-06-10T14:59:21Z</updated>

		<summary type="html">&lt;p&gt;Ednovstormbrewer: /* Incidents */ Added the summary about OEM locked bootloaders&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
{{InfoboxProductLine&lt;br /&gt;
| Title = Android&lt;br /&gt;
| Release Year = 2003&lt;br /&gt;
| Product Type = Software&lt;br /&gt;
| In Production = Yes&lt;br /&gt;
| Official Website = https://android.com/&lt;br /&gt;
| Logo = Android Logo.png&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Android_(operating_system)|&#039;&#039;&#039;Android&#039;&#039;&#039;]] is an operating system developed and released by &#039;&#039;&#039;[[Google]]&#039;&#039;&#039; since 2005. It is based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen-based mobile devices such as smartphones and tablets, but is also used in smart TVs, cameras, in-car infotainment systems, etc.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
Google, as the developer of Android, has faced scrutiny over privacy concerns, short software support lifespans, patent disputes, and anti-competitive behaviors.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
Google encourages the use of their [https://developer.android.com/google/play/integrity/overview Play Integrity API], a mechanism for Android applications to detect whether they are running on a non-OEM version of Android. This is employed mostly to prevent users from running Android versions with anti-consumer features removed, i.e. ads and unconsented data collection. For example, the Android YouTube app which leverages the API to detect whether it has been patched to remove ads, in which case it will refuse to play back videos.&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
This is a list of all consumer protection incidents related to this software. Any incidents not mentioned here can be found in the [[:Category:{{PAGENAME}}|{{PAGENAME}} category]].&lt;br /&gt;
&lt;br /&gt;
===Data collection===&lt;br /&gt;
{{Main|Android Data Collection}}&lt;br /&gt;
Android mobile devices, even when minimally configured, collect and share with Google extensive user data with little options for opting-out, raising privacy concerns.&lt;br /&gt;
&lt;br /&gt;
===Android System Safety Core silent install===&lt;br /&gt;
{{Hatnote|Full article: [[Android System SafetyCore]]}}&lt;br /&gt;
In January 22, 2025, Google quietly rolled out Android System SafetyCore to all Android devices. The installation of the program neither informed consumers that it was installed, nor did it request consumers to install it onto their devices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;OEM Locked Bootloaders&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In North America, Many of Android phones like Samsung&#039;s Snapdragon devices will not allow consumers to unlock their phones and do what they want to modify the software. Therefore, it has been incredibly difficult and nearly impossible to root and install custom ROMs into the device unless an exploit has been found. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Ednovstormbrewer</name></author>
	</entry>
</feed>