Bananabot (talk | contribs)
Added archive URLs for 1 citation(s) using CRWCitationBot
Rudxain (talk | contribs)
m link "capability to track" to Spyware
Line 8: Line 8:
==Consumer impact summary==
==Consumer impact summary==
===Privacy concerns===
===Privacy concerns===
Kernel-level anti-cheat has access to every process that runs on a computer, from a simple video running in the background, to processes that may be more private for the user. As this software is designed to run on startup,<ref>{{Cite web |last=Rigney |first=Ryan K. |date=23 Feb 2024 |title=The Gamers Do Not Understand Anti-Cheat |url=https://www.pushtotalk.gg/p/the-gamers-do-not-understand-anti-cheat |access-date=2025-06-10 |website=Push To Talk |archive-url=http://web.archive.org/web/20251215134002/https://www.pushtotalk.gg/p/the-gamers-do-not-understand-anti-cheat |archive-date=15 Dec 2025}}</ref> this means even if the intended game the software was installed for is not currently running, it retains the capability to track the user's behaviors. This can range from gathering data that could be sold to advertisers to, if the software itself is hijacked by a malicious actor, the harvesting of sensitive personal information.
Kernel-level anti-cheat has access to every process that runs on a computer, from a simple video running in the background, to processes that may be more private for the user. As this software is designed to run on startup,<ref>{{Cite web |last=Rigney |first=Ryan K. |date=23 Feb 2024 |title=The Gamers Do Not Understand Anti-Cheat |url=https://www.pushtotalk.gg/p/the-gamers-do-not-understand-anti-cheat |access-date=2025-06-10 |website=Push To Talk |archive-url=http://web.archive.org/web/20251215134002/https://www.pushtotalk.gg/p/the-gamers-do-not-understand-anti-cheat |archive-date=15 Dec 2025}}</ref> this means even if the intended game the software was installed for is not currently running, it retains the [[Spyware|capability to track]] the user's behaviors. This can range from gathering data that could be sold to advertisers to, if the software itself is hijacked by a malicious actor, the harvesting of sensitive personal information.


===Security concerns===
===Security concerns===