Great job PC Helldivers. Can the community do something about the Kernel-level rootkit?
It runs in userspace on Linux
Noob question: has anyone confirmed that it’s really running in userspace on linux or win gaming tech forums yet? Doesn’t effective anti-cheat require root privileges?
This is a pretty important thing to validate, in my opinion.
It is impossible to run in kernel without being explicitly given that permission.
Client anitcheat is never perfect, it is slightly better in kernel but that just caused more issues for legitimate customers.
None of this even makes sense as HD2 isn’t a PvP game.
I suppose that a legitimate argument for anti-cheat could be griefing, but then the host could just boot the player based on a basic voting system. In general I was curious to see “what’s under the hood” of a kernel-level and a userspace-level anti-cheat service and what are the implicit security risks for an average user.
I think the most compelling for me was something like in MW2 back in the day hacked lobbies fucking up a your stats. Something similar in hd2 could ruin it for some.
In Helldivers 2’s case, say a cheater forces everyone in that mission to max out samples/medals/super credits, it entirely kills the progression and takes away a reason to keep playing unless it’s reverted safely, which then means that mission was pointless because someone else used cheats.
The solution to that is to rework how rewards are calculated, maybe do some sanity checks with the server, not seize super admin control of personal hardware.