• Shanmugha@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    7 days ago

    Wait, you mean client-side anticheat is not some holy unbreakable barrier? I am shocked (sarcasm)

  • bunlee@lemmy.zip
    link
    fedilink
    English
    arrow-up
    0
    ·
    7 days ago

    What is denuvo? Would someone break down how it works. It sounds like an interesting thing to learn from as I think they used 18bit encryption for early pioneers that it was for coded placement for locked sections of a nest portal. These were introduced to Nintendo i think for games like Zelda. I think it was denuvo that had been early ways of releasing full games. The only thing I could remember from something with computers but it’s been years since I ever worked on computers. Denuvo sounds very familiar from what I had seen a long time ago.

    • Ninjascubarex@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      6 days ago

      Sharing chatgpt answer as I was curious myself

      Denuvo differs from older DRM by continuously protecting the game’s code instead of just checking ownership once. Traditional systems like Steam or SecuROM perform a one-time validation, but Denuvo embeds encryption, obfuscation, and constant runtime checks directly into the executable, making it much harder to analyze or modify. The recent bypass described by Tom’s Hardware didn’t actually “crack” Denuvo in the traditional sense. Instead, it used a hypervisor, a low-level virtualization layer, to sit between the game and the operating system and feed Denuvo fake “valid” responses so it believes everything is legitimate. This avoids removing the protection entirely and instead tricks it. The tradeoff is that the method requires disabling core Windows security features, which creates serious system-level risks and is why even some in the piracy community consider it unsafe.

      • bunlee@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        6 days ago

        That was a beautiful response i used to like DRM as there used to be vaults for saving your product now it’s just a mess as these companies used to use viruses to modified DRM. I think it’s gonna prevent hacking but why ruin a whole system. The thing about DRM was that I could remember that it had used these prompt servers DLL and thats when I feel like if you tested the outward ping and inward ping it would detect these spyware built inside these games sometimes. I think pingserver used to detect this stuff and it was important because there has been so much modification to games that people make and steal whats needed to make money off you. I think it’s called pingserver you should test these new games as they rely on internet more than ever now.

    • AHemlocksLie@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      7 days ago

      GOG is strictly anti-DRM, so you’ll never get Denuvo-enable games there. You miiiiiight get them after Denuvo gets pulled out since that often happens after… 6 months? A year or two? But the sort of publisher that wants Denuvo included is probably the same kind to refuse a totally DRM-free release.

  • thedeadwalking4242@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    8 days ago

    On the one hand software freedom.

    On the other this has me thinking about how fascinating this problem is from academic standpoint.

    How can you ensure software can ONLY run on the machines you allow? Even if the user has ring 0 access?

    Is it mathematically impossible to achieve?

    • LedgeDrop@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 days ago

      It’s totally possible to achieve. TPM is the desktop equivalent of the technology that runs on your cellphone to have apps detect if you have an unlocked bootloader or root. It’s the same technology prevents your favorite concole (ie: switch 2, ect) from running pirated games.

      This improved security does come at a price: we/the users are the enemy and cannot be trusted. This means modifying your system will be prohibited and we (the consumer) will have to trust that Big Tech has our best interests in mind. /s

        • LedgeDrop@lemmy.zip
          link
          fedilink
          English
          arrow-up
          0
          ·
          8 days ago

          To expand on this a bit:

          It’s all built on top of the concept of “a chain of trust”, starting at the hardware level.

          (as mentioned) TPM is a chip that’ll store encryption keys at a hardware level and retrieval of these keys can only happen if the hardware is unmodified.

          I assume that part of this key is derived from aspects of your OS (ie: all device drivers are signed by MS).

          The OS will fetch this key, if it’s valid - the OS knows that the hardware is untampered, it can then verify that the OS is unmodified, which can then be used by application to determine that their not modified, etc.

          Now you could spoof your own TPM chip (similar to how Switch 1’s are chipped/nodded), but the deal-breaker is that when you add your key to the TPM chip, you sign it with a hardware vendor specific public key. And that vendor private key is baked into the hardware (often into the CPU, so the private key never crosses the hardware bus).

          • meaansel@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            7 days ago

            But at the end of day, doesn’t app have to ask OS? At that stage, can’t you spoof “positive” responce of unmodified system?

            • LedgeDrop@lemmy.zip
              link
              fedilink
              English
              arrow-up
              1
              ·
              6 days ago

              That’s the strength of public/private key encryption.

              The application (or OS) knows what the hardware vendors public key is. Thus ,it can verify that any message (or application key) claiming to come from that hardware (TPM) is legitimate or not. Thus, the OS is just a proxy or the middle man.

              Now what you could do (in theory) is to start modifying the application and replace the hardware vendor public key with your own. …but you’d need to do this with every application and they’ll probably have some sort of anti-tampering or (more likely) you won’t even be allowed to install the application because your OS isn’t “safe/secure”.

              disclaimer: I’m a bit hazy on some of these details. There are probably more elegant solutions.