• Dark Arc@social.packetloss.gg
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    3 months ago

    They can do whatever they want. Operating systems are effectively divided into two partitions, privileged kernel space and user space.

    When you run a kernel level anticheat what you’re really doing is running a custom program in the kernel space. It effectively becomes part of Windows.

    This means that anything that an operating system can instruct hardware to do, that program can do. It can read your files, check your email, print letter you wrote to your crush in Word but “deleted” because it was embarrassing, log every key you type, turn on your webcam, listen to the microphone, download explicit or illegal imagery, upload your hard drive to the NSA, disable your computer fans, etc

    You really only want to run this stuff if it’s from a trustworthy vendor and even then it’s completely defensible to object to running one of these programs.

    Currently these things have yet to be caught doing any of these things, but that’s because they haven’t been instructed to, not because they can’t.

    • danc4498@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 months ago

      I guess what I’m saying is if this information was being sent across a network, that would be detectable.

      • ipkpjersi@lemmy.ml
        link
        fedilink
        English
        arrow-up
        4
        ·
        3 months ago

        I guess what I’m saying is if this information was being sent across a network, that would be detectable.

        If you are constantly monitoring 24/7/365, sure. We don’t know how often it would send it if it does, it would require reverse engineering and intense monitoring. Also, even if they aren’t doing it now doesn’t mean they can’t easily add it in a patch.

        It’s generally not worth trusting IMO.