this post was submitted on 04 Apr 2026
367 points (99.2% liked)

Technology

83529 readers
1863 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] Shanmugha@lemmy.world 6 points 1 day ago* (last edited 1 day ago) (1 children)

Wait, you mean client-side anticheat is not some holy unbreakable barrier? I am shocked (sarcasm)

[–] quips@slrpnk.net 3 points 20 hours ago* (last edited 20 hours ago) (1 children)

You are an idiot. This is quite exciting.

[–] Shanmugha@lemmy.world 0 points 19 hours ago

Good for you then :)

[–] bunnydog@lemmy.zip 3 points 1 day ago (1 children)

What is denuvo? Would someone break down how it works. It sounds like an interesting thing to learn from as I think they used 18bit encryption for early pioneers that it was for coded placement for locked sections of a nest portal. These were introduced to Nintendo i think for games like Zelda. I think it was denuvo that had been early ways of releasing full games. The only thing I could remember from something with computers but it’s been years since I ever worked on computers. Denuvo sounds very familiar from what I had seen a long time ago.

[–] Ninjascubarex@lemmy.zip 2 points 18 hours ago (1 children)

Sharing chatgpt answer as I was curious myself

Denuvo differs from older DRM by continuously protecting the game’s code instead of just checking ownership once. Traditional systems like Steam or SecuROM perform a one-time validation, but Denuvo embeds encryption, obfuscation, and constant runtime checks directly into the executable, making it much harder to analyze or modify. The recent bypass described by Tom’s Hardware didn’t actually “crack” Denuvo in the traditional sense. Instead, it used a hypervisor, a low-level virtualization layer, to sit between the game and the operating system and feed Denuvo fake “valid” responses so it believes everything is legitimate. This avoids removing the protection entirely and instead tricks it. The tradeoff is that the method requires disabling core Windows security features, which creates serious system-level risks and is why even some in the piracy community consider it unsafe.

[–] bunnydog@lemmy.zip 1 points 4 hours ago

That was a beautiful response i used to like DRM as there used to be vaults for saving your product now it’s just a mess as these companies used to use viruses to modified DRM. I think it’s gonna prevent hacking but why ruin a whole system. The thing about DRM was that I could remember that it had used these prompt servers DLL and thats when I feel like if you tested the outward ping and inward ping it would detect these spyware built inside these games sometimes. I think pingserver used to detect this stuff and it was important because there has been so much modification to games that people make and steal whats needed to make money off you. I think it’s called pingserver you should test these new games as they rely on internet more than ever now.

[–] GreenBeanMachine@lemmy.world 23 points 1 day ago

Good, I hope they go bankrupt.

[–] Fmstrat@lemmy.world 3 points 1 day ago (2 children)

Would running in Proton mean the security issues are moot?

[–] LiveLM@lemmy.zip 5 points 1 day ago

This is too low level to run in Proton.

[–] descartador@lemmy.eco.br 2 points 1 day ago

Doesn't work

[–] cybernihongo@reddthat.com 1 points 1 day ago (1 children)

When are Denuvo games coming to GOG and itch.io? We feel extremely left out guys.

[–] AHemlocksLie@lemmy.zip 4 points 23 hours ago* (last edited 23 hours ago) (1 children)

GOG is strictly anti-DRM, so you'll never get Denuvo-enable games there. You miiiiiight get them after Denuvo gets pulled out since that often happens after... 6 months? A year or two? But the sort of publisher that wants Denuvo included is probably the same kind to refuse a totally DRM-free release.

[–] cybernihongo@reddthat.com 3 points 19 hours ago

.........I should've added the /s, come to think of it.

[–] Dyskolos@lemmy.zip 180 points 2 days ago* (last edited 2 days ago) (6 children)

Easy solution: fuck denuvo. Fuck the games that use it. And also fuck windows.

Edit: it has been shown many many many times over the many many many years, that preventing Piracy doesn't mean increased sales or vice versa.

Those who don't buy because the can't, won't play It if DRMed (loss not even near the cost of denuvo)

Those who don't buy because they make informed decisions, won't buy or play it, if DRMed (loss plus denuvo cost)

And many would buy a game even if it's non-DRM-ed just because they liked it and want to support the devs. I bought soooo many games AFTER I already finished them or were halfway through.

And putting denuvo on it, instead of giving me a demo? Fuck you. I know the game is shit just by that.

[–] rozodru@piefed.world 59 points 2 days ago (2 children)

the infuriating one is Capcom. after all these years, decades even, they STILL to this DAY do not understand PC games. they still have yet to figure out HOW to optimize their games for PC and would STILL keep using Denuvo even AFTER admitting that "yeah it slows our games down, yeah we remove it and then put it back"

Either it's old as Japanese execs at capcom that refuse to understand gaming on the PC or they just don't care. But it boggles my mind how Capcom kept using Denuvo while admitting it fucks their shit up.

[–] uzay@infosec.pub 14 points 1 day ago

Capcom puts Denuvo into everything, then after a while they replace it with enigma, which is presumably cheaper, and leave that shit in indefinitely. They also put DRM in games on Steam that they are already selling DRM-free on GoG, defeating any imagined benefit DRM could have and just punishing their actual customers.

Sega meanwhile puts Denuvo into absolutely everything and just keeps it in forever. Square Enix puts Denuvo into everything, but at least usually removes it after a while. I'm thinking this might really be a Japanese thing. They also don't only hate piracy but modding as well, so I'm not surprised they would all opt for the most heinous form of DRM.

load more comments (1 replies)
load more comments (5 replies)
[–] devolution@lemmy.world 7 points 1 day ago (1 children)

By someone besides Empress?

[–] riquisimo@lemmy.world 5 points 1 day ago

https://crackwatcher.com/

Sort by popular, there are so many denuvo titles on there now cracked.

[–] thedeadwalking4242@lemmy.world 37 points 2 days ago (6 children)

On the one hand software freedom.

On the other this has me thinking about how fascinating this problem is from academic standpoint.

How can you ensure software can ONLY run on the machines you allow? Even if the user has ring 0 access?

Is it mathematically impossible to achieve?

[–] SpikesOtherDog@ani.social 46 points 2 days ago (3 children)

SAAS. You never install the entire application. Large parts of the engine never run locally.

[–] mlg@lemmy.world 8 points 2 days ago

I think Denuvo technically does a little bit of this.

I forgot the exact details, but one of the keys that's used to unscramble the bytecode has to be downloaded from their registry server on first launch.

But after that, it's not required.

[–] Cethin@lemmy.zip 7 points 2 days ago (2 children)

Although that still never totally protects it. I've seen a fair few number of passionate game communities bring online-only games back from the dead by reverse engineering the server architecture. It's a lot of work, but if you know how the software is supposed to function then you can write the other half of the software that gives the response to make that work.

[–] Dnb@lemmy.dbzer0.com 5 points 2 days ago (1 children)

City of heroes is a big example

[–] Mondez@lemdro.id 3 points 1 day ago

The original code for that was leaked, most if not all replacement servers run that code, not reverse engineered code.

[–] SpikesOtherDog@ani.social 4 points 2 days ago (1 children)

Yeah, I can see that. I'm thinking of streaming assets and code on demand, similar to how an optical disk works. It's a terrible waste of resources, and they can be grabbed if they are not cryptographically secured.

[–] Cethin@lemmy.zip 3 points 2 days ago

Even that, a dedicated player can capture it. If it has to be rendered on the device then they have access to the assets.

[–] frongt@lemmy.zip 11 points 2 days ago (1 children)

Or use the cloud gaming approach and just stream the video, no local engine at all!

[–] SpikesOtherDog@ani.social 7 points 2 days ago (1 children)

That would protect the IP, but the response time is terrible. Pinging Google.com I get a response time of about 80 ms. At that delay, everything would feel spongy and laggy.

[–] frongt@lemmy.zip 17 points 2 days ago

If they cared about your experience they wouldn't be using intrusive DRM at all.

[–] aurelar@lemmy.ml 3 points 1 day ago

Practically speaking, people already have cell phones that are impossible to own, because in many cases, users are not allowed to unlock the bootloaders of their phones.

[–] LedgeDrop@lemmy.zip 16 points 2 days ago (1 children)

It's totally possible to achieve. TPM is the desktop equivalent of the technology that runs on your cellphone to have apps detect if you have an unlocked bootloader or root. It's the same technology prevents your favorite concole (ie: switch 2, ect) from running pirated games.

This improved security does come at a price: we/the users are the enemy and cannot be trusted. This means modifying your system will be prohibited and we (the consumer) will have to trust that Big Tech has our best interests in mind. /s

[–] SomethingBurger@jlai.lu 12 points 2 days ago (2 children)

What's preventing spoofing this with a fake implementation?

[–] LedgeDrop@lemmy.zip 5 points 2 days ago (2 children)

To expand on this a bit:

It's all built on top of the concept of "a chain of trust", starting at the hardware level.

(as mentioned) TPM is a chip that'll store encryption keys at a hardware level and retrieval of these keys can only happen if the hardware is unmodified.

I assume that part of this key is derived from aspects of your OS (ie: all device drivers are signed by MS).

The OS will fetch this key, if it's valid - the OS knows that the hardware is untampered, it can then verify that the OS is unmodified, which can then be used by application to determine that their not modified, etc.

Now you could spoof your own TPM chip (similar to how Switch 1's are chipped/nodded), but the deal-breaker is that when you add your key to the TPM chip, you sign it with a hardware vendor specific public key. And that vendor private key is baked into the hardware (often into the CPU, so the private key never crosses the hardware bus).

[–] redsand@infosec.pub 1 points 18 hours ago

Luckily that key always leaks from a human or side channel

[–] meaansel@lemmy.world 1 points 1 day ago (1 children)

But at the end of day, doesn't app have to ask OS? At that stage, can't you spoof "positive" responce of unmodified system?

[–] LedgeDrop@lemmy.zip 2 points 14 hours ago

That's the strength of public/private key encryption.

The application (or OS) knows what the hardware vendors public key is. Thus ,it can verify that any message (or application key) claiming to come from that hardware (TPM) is legitimate or not. Thus, the OS is just a proxy or the middle man.

Now what you could do (in theory) is to start modifying the application and replace the hardware vendor public key with your own. ...but you'd need to do this with every application and they'll probably have some sort of anti-tampering or (more likely) you won't even be allowed to install the application because your OS isn't "safe/secure".

disclaimer: I'm a bit hazy on some of these details. There are probably more elegant solutions.

load more comments (1 replies)
[–] redsand@infosec.pub 6 points 2 days ago

Only with a client server model like in multiplayer or always online games. DRM is a conceptual scam. This kind of attack is unpatchable. It's essentially a blue pill attack against a single program.

load more comments (1 replies)
[–] Mwa@thelemmy.club 55 points 2 days ago (1 children)

Am still not playing any Video Game with Denuvo.
(I only play games with Steam's DRM)

[–] lemmyng@lemmy.world 15 points 2 days ago* (last edited 2 days ago) (2 children)

SkidrowReloaded

RepacksLab

Fitgirl Repacks

ElAmigos

[–] tacosanonymous@mander.xyz 20 points 2 days ago (1 children)

For sure but I’m not doing hypervisor. That shit is dumb.

load more comments (1 replies)
load more comments (1 replies)
[–] Kissaki@feddit.org 18 points 2 days ago (1 children)

What kind of measures do current Denuvo versions take that they need these kinds of bypasses?

[–] Kolanaki@pawb.social 16 points 2 days ago (1 children)

It's at least running in the HyperVisor layer of the OS, which to my understanding is basically the same as a rootkit, tho I am not sure if it's a higher or lower level than that.

load more comments (1 replies)
[–] HugeNerd@lemmy.ca 1 points 1 day ago

oh do flexlm next...

[–] NannerBanner@literature.cafe 8 points 2 days ago (2 children)

I'm not the most familiar with hardware level stuff. With the security disabled as in the article, can a malevolent actor rewrite firmware or leave the equivalent of an undetectable rootkit on your hardware? It would be mildly amusing to see an entire generation of pirates fuck up here, but also reminds me of the arguments regarding the intel cpus having a secondary, unknown firmware in the form of the management thingamajig.

[–] frongt@lemmy.zip 13 points 2 days ago* (last edited 2 days ago)

Firmware, unlikely. Rootkit, probably. The most likely attack is plain old malware. Attacks relying on those security features being disabled are uncommon.

However! If a malicious actor says "hey here's a guide to defeat denuvo on the latest game, and here's the crack', and the guide tells you to disable certain security features, the crack can contain malware specifically crafted to exploit that scenario. It's one of the reasons that guides saying "disable uac, disable antivirus, run as admin" are a huge bright red flag.

load more comments (1 replies)
load more comments
view more: next ›