Remix.run Logo
metalcrow 9 hours ago

That's fair, although aren't most TPMs nowadays fTPMs? No interceptable communication that way.

Retr0id 9 hours ago | parent | next [-]

Until they require fTPMs, an attacker can just choose to use a regular TPM.

A more sophisticated attacker could plausibly extract key material from the TPM itself via sidechannels, and sign their own attestations.

Charon77 9 hours ago | parent [-]

I remember there's a PCI device that's meant to be snooping and manipulating RAM directly by using DMA. Pretty much one computer runs the game and one computer runs the cheat. I think kernel anti cheats are just raising the bar while pretty much being too intrusive

int_19h 4 hours ago | parent [-]

TFA explicitly describes those devices, and how anti-cheat developers are trying to handle this.

But the main point there is that this setup is prohibitively expensive for most cheaters.

nextaccountic 7 hours ago | parent | prev | next [-]

what about faulTPM? https://arxiv.org/abs/2304.14717

edoceo 9 hours ago | parent | prev [-]

Can a TPM be faked in a QEMU VM?

kay_o 9 hours ago | parent | next [-]

We don't allow games to run in virtual machines and require TPM. Check TPM EK signing up to an approved manufacturer.

It is not "fake", a software TPM is real TPM but not accepted/approved by anticheat due to inability to prove its provenance

(Disclosure: I am not on the team that works on Vanguard, I do not make these decisions, I personally would like to play on my framework laptop)

invokestatic 9 hours ago | parent | prev | next [-]

Technically yes, but it would produce an untrusted remote attestation signature (quote). This is roughly equivalent to using TLS with a self-signed certificate — it’s not trusted by anyone else. TPMs have a signing key that’s endorsed by the TPM vendor’s CA.

carefree-bob 9 hours ago | parent | prev [-]

Yes! https://github.com/stefanberger/swtpm