| ▲ | mschuster91 3 hours ago | |||||||
> NT system calls use the same syscall numbering as recent Windows, to support applications that hardcode syscall numbers. Other than antivirus software and maybe MAYBE kernel-level "anticheat" slop - who in their right mind does straight syscalls to the kernel? | ||||||||
| ▲ | StrauXX 3 hours ago | parent | next [-] | |||||||
Some programming language compilers generate asm that does call systemcalls directly. Go for example. | ||||||||
| ||||||||
| ▲ | userbinator an hour ago | parent | prev | next [-] | |||||||
Does it matter? The closer they get to being indistinguishable from Windows, the better. | ||||||||
| ||||||||
| ▲ | tux3 3 hours ago | parent | prev | next [-] | |||||||
Userland DRMs do all sort of nonsense. Kernel anticheats wouldn't use the syscalls, they're already able to call the kernel routines they want directly. | ||||||||
| ▲ | kachapopopow 2 hours ago | parent | prev | next [-] | |||||||
anti tamper, drm, library call obfuscation and they all do it wrong, really wrong. | ||||||||
| ▲ | 3 hours ago | parent | prev [-] | |||||||
| [deleted] | ||||||||