this post was submitted on 19 Dec 2025
162 points (99.4% liked)

PC Gaming

13016 readers
786 users here now

For PC gaming news and discussion. PCGamingWiki

Rules:

  1. Be Respectful.
  2. No Spam or Porn.
  3. No Advertising.
  4. No Memes.
  5. No Tech Support.
  6. No questions about buying/building computers.
  7. No game suggestions, friend requests, surveys, or begging.
  8. No Let's Plays, streams, highlight reels/montages, random videos or shorts.
  9. No off-topic posts/comments, within reason.
  10. Use the original source, no clickbait titles, no duplicates. (Submissions should be from the original source if possible, unless from paywalled or non-english sources. If the title is clickbait or lacks context you may lightly edit the title.)

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] AudaciousArmadillo@piefed.blahaj.zone 5 points 1 week ago (2 children)

How does the AC check the BIOS version? If you have DMA you should be able to spoof that, even against the kernel I assume. I guess its a cat and mouse of spoofing detection by the AC versus the cheat devs?

[–] mholiv@lemmy.world 5 points 1 week ago

The bios flaw they were exploring was the bios having flawed anti DMA protections.

From the article

According to the company, the Input-Output Memory Management Unit (IOMMU), which protects system RAM from Direct Memory Access (DMA) devices, is not fully initializing upon boot in some motherboard models. This means that even though the BIOS might indicate that Pre-Boot DMA Protection is active, it’s not actually protecting the entire system.

[–] homura1650@lemmy.world 3 points 1 week ago

Possibly TPM backed remote attestation. Having said that, once you are at the point of being worried about hardware DMA attacks, TPM attestation is not as full proof as you might think.