this post was submitted on 15 Jan 2024
32 points (84.8% liked)

Privacy

31935 readers
731 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

If I have an encrypted Linux partition and a Windows partition that I use as a bootloader into Riot's games, what are the drawbacks of installing their kernel level anticheat?

you are viewing a single comment's thread
view the rest of the comments
[–] driveway@lemmy.zip 2 points 10 months ago (2 children)

Interesting. It's weird that a kernel level program can upgrade UEFI. We run a lot of closed source kernel level stuff already. Do you have any links for further reading?

[–] Tarogar@feddit.de 6 points 10 months ago (2 children)

Realistically a good starting point to read up on could be about admin privileges. Or ring 0 in software. It basically boils down to the fact that anything that is running as root ( or with admin privileges) can read and write to ANY file it wants to. Effectively having full control over the system.

In other words it could be used to do anything they want with your pc. An example of that actually happening is the anti Cheat that genshin impact is using because that was exploited in that way already.

[–] Kory@lemmy.ml 1 points 10 months ago

Do you have some further reading on the active exploit of Genshin Impact's anti-cheat?

[–] driveway@lemmy.zip 1 points 10 months ago (1 children)

I know about ring 0, I just assumed UEFI would be off the disk and inaccessible to any software.

[–] BearOfaTime@lemm.ee 5 points 10 months ago

UEFI is off disk, but it is writeable to some degree.

Recently there was a story about a hack exploiting the ability to write boot images (as in vendor screens that display during boot).

There's also the ability to store executable code that runs even if the system doesn't have an OS - this is ostensibly used for theft prevention solutions. Just imagine how that can be abused.

UEFI is a ******* problem. I've never liked it. I get why it exists, but it's design was intentionally borked to push DRM-like control, under the guise of offering increased security. Yet we have that boot code that can be executed silently.

It would be nice to see the 80's BIOS wars again, with an open-source UEFI organization this time.

[–] MonkderZweite@feddit.ch 6 points 10 months ago (1 children)

There definitely is upgrading of UEFI/disk firmware from a running Windows. So if Windows can...

[–] BearOfaTime@lemm.ee 2 points 10 months ago

Isn't that terrifying, and rather telling? Effing Windows can edit UEFI...