Kernel Level Anti-Cheats: Difference between revisions
m removed helpful boxes |
SinexTitan (talk | contribs) slight recorrection and added sm more info |
||
Line 2: | Line 2: | ||
==How it works== | ==How it works== | ||
Kernel level anti-cheats run at the kernel level, the deepest and most authoritative level of the computer. They are software that have access to everything the computer is doing. This is in contrast to traditional, user level anti-cheats, which only had access to user-level permissions and therefore could not detect certain cheat engines which were cleverly hidden. | |||
==Why it is a problem== | ==Why it is a problem== | ||
===Privacy Concerns=== | ===Privacy Concerns=== | ||
As kernel level anti-cheats have access to everything that's going on in a computer, any party that hijacks said anti-cheat can snoop on the private daily lives of users. | |||
===Security Concerns=== | ===Security Concerns=== | ||
Since Kernel Level anti-cheats operate at the kernel level, when they are eventually hijacked and exploited they create a massive security issue directly at the kernel level. This has happened with [[Genshin Impact]], where hackers hijacked the anti-cheat used, to deliver ransomware to users' systems.<ref>{{Cite web |last=Soliven |first=Ryan |last2=Kimura |first2=Hitomi |date=2022-08-24 |title=Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus |url=https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html}}</ref> | |||
==Examples== | ==Examples== |