return to table of content

Keyhole – Forge own Windows Store licenses

AshamedCaptain
107 replies
8h15m

After reading the article, and specially the remarks about this engine being copy-pasted from the Xbox DRM engine , does anyone still believe that Pluton, also copy-pasted from the Xbox, is about end user security? And not totally about MS finally having enforceable DRM on PCs?

Oh and by the way Pluton is now on the latest batch of Intel laptop chips. And has been on AMDs for a while. How soon until Windows requires it?

dist-epoch
88 replies
7h39m

People have been saying that for more than 10 years now, since the TPM was introduced.

Yet you can still install Linux on PCs sold with Windows, you can still install third party software on Windows not from a Store, you can still watch pirated movies downloaded from torrents.

You can even run an unregistered/unpaid version of Windows if you don't mind that it will not let you change the desktop background image.

nulld3v
63 replies
7h12m

Or you can recognize that app/game developers are starting to require Secure Boot enforcement if you want to continue to use their apps or play their games.

RIOT requires users to enable TPM-enforced Secure Boot starting with Windows 11 to play Valorant: https://support-valorant.riotgames.com/hc/en-us/articles/100...

dist-epoch
47 replies
7h6m

Let me tell you a secret: it's because the gamers are demanding that. The game companies couldn't care less if there are cheaters in the game, but it's the players which put huge pressure on the game companies to detect and ban cheaters.

choo-t
27 replies
6h39m

Let me tell you a secret: it's because the gamers are demanding that.

Citation needed.

Whose these gamers ? I surely didn't ask for this neither any of the gamers I know, nor seen any demand about that in gaming forums.

The game companies couldn't care less if there are cheaters in the game, but it's the players which put huge pressure on the game companies to detect and ban cheaters.

The jump from this to "requiring TPM" is quite a long one.

eezurr
20 replies
6h19m

Go on steam and look at the recent reviews for older but still popular fps games. Gamers complain about cheaters constantly and will negatively review games cause of it

choo-t
19 replies
5h39m

They're demanding a way to handle or ban cheater, not requiring TPM, that's a non sequitur.

brookst
15 replies
4h25m

There is no technical way to prevent cheating in advance without secure boot. Gamers aren’t saying they want lots of cheaters but they should be banned eventually, they are saying they want to play games without cheaters.

user_7832
7 replies
4h2m

There is no technical way to prevent cheating in advance without secure boot.

I'm not really sure I buy this. I can't really give a way that can guarantee no cheating but I know for example games like Genshin Impact run almost all the code (dmg calculation etc) server-side. Perhaps something that's an extension of Geforce Now might be the best "anti-cheat" technically speaking.

jprete
6 replies
3h41m

To run anti-cheat in that way, you need all game mechanics to be run server-side, and you need to not let the client ever know about something the player should not know - e.g. in a first-person shooter you need to run visibility and occlusion on the server too! Otherwise the cheating will take the form of seeing through walls and the like. This is going to boost the cost of the servers and probably any game subscription, and might lead to bandwidth or latency problems for players - just to avoid running any calculation that is relevant to game balance on player hardware.

choo-t
5 replies
3h33m

Well yeah, that's the correct way to run a server, don't send information you don't want the user to get.

But as you are pointing out, forcing client-side intrusive anti-cheat is cheaper, thus this as nothing to do about preventing cheating, but about reducing cost.

dumbo-octopus
2 replies
3h26m

The end state of your argument is the game runs entirely on hosted hardware and you pay for a license to stream the final rendered output to your monitor. This is already happening. Soon games won’t be able to be “bought” at all, you’ll just pay the server a number of dollars per hour for the privilege of them letting you use their hardware.

You will own nothing and like it.

choo-t
1 replies
2h54m

Making occlusion calculation sever-side during multiplayer have nothing to do with "owning" a game or not.

You can even do this calculation on community-run private server.

dumbo-octopus
0 replies
2h38m

If all surfaces are fully opaque, maybe. The second particle effects and volumetric effects and all sorts of advanced techniques play a role in actual gameplay, no. And that’s only for this one type of cheating.

Rohansi
1 replies
3h2m

It's not just about cost. Theoretically yes, you shouldn't send information that you don't want users to get and abuse. However, in the context of games, this is not always possible because most games are realtime and need to tolerate network latency. There is no perfect solution - there will always be tradeoffs.

Ideally player A shouldn't be networked player B if there is a wall between them but what happens when they're at the edge of the wall? You don't want them to pop in so you need some tolerance. But having that tolerance would also allow cheaters to see players through walls near edges. Or your game design might require you to hear sounds on the other side of the wall (footsteps, gunshots, etc.) which allows cheats to infer what what may be behind the wall better than a person would.

choo-t
0 replies
2h46m

Or your game design might require you to hear sounds on the other side of the wall (footsteps, gunshots, etc.) which allows cheats to infer what what may be behind the wall better than a person would.

Yes, and you cannot prevent this except in in-person tournament.

Any output send toward the player, even a faint audio queue could be analyzed, and use to trigger an action or display an overlay to the screen, and no amount of kernel-level stuff will prevent that, as you can do this outside of the computer running the game.

candiddevmike
3 replies
3h28m

Back in my day we all played on private, community ran servers where you could easily vote to kick/ban folks, the server owner was your buddy, or you played with people you trust.

Now everything is matchmaking, private servers, live service and that sense of community is gone.

card_zero
2 replies
2h52m

Why isn't it still like that? Don't players want small communities?

reisse
0 replies
2h8m

It's very hard to gather full teams (usually 10 persons) in a small communities. Public matchmaking gives an opportunity to start a game in a minute from clicking "play", regardless of how many people you have at hand right now.

Small communities still exist, it's just that vacant places are now filled with strangers.

choo-t
0 replies
2h14m

lot of thing happened, 6th gen consoles started a new way of using online games (no keyboard, no third party chat/vocal, no group chat out of game, no private server), then the industry pivoted away from private server to have more control on their games, then the whole F2P economy then GaaS took any agency out of players hands.

beeboobaa3
1 replies
3h30m

There's no way secure boot totally prevents cheating, either. It just moves the goalpost a little, cheating will always be possible.

_flux
0 replies
10m

The goalpost just needs to be moved further than is economically interesting for cheaters in general to reach.

Perhaps secure boot by itself isn't enough, but I would imagine it would be a relatively large bump, when combined with a kernel-level anti-cheat. I presume such anti-cheats would e.g. disable the debugger access of game memory or otherwise debugging it, accessing the screen contents of the game or sending it artificial inputs.

What vectors remain? I guess at least finding bugs in the game, network traffic analysis, attempting MitM, capturing or even modifying actual data in the DRAM chips, using USB devices controlled by an external device that sees the game via a camera or HDMI capture.. All these can be plugged or require big efforts to make use of.

choo-t
0 replies
4h13m

You cannot "prevent" cheating, you can at best mitigate it, it's a balance.

There plenty of way to mitigate cheating in game, but the game industry is focusing on the ones where they don't bear the cost and only the customer will (and this view is in part due to the model of F2P games, where banning cheater is useless as it doesn't cost them anything to create a new account).

Letting game developer having complete control and spying on the device playing the game is fine in a physical tournament were they provide the device, but it's insanity when it's the user own device in its home.

RHSeeger
2 replies
4h52m

You're being disingenuous here, or just missing the point. The point being made was the gamers are demanding game developers stop cheaters... and that secure boot (and related ways to lock down the computer) is one of the primary tools they know to use to do that.

choo-t
1 replies
4h8m

The point being made was the gamers are demanding game developers stop cheaters... and that secure boot (and related ways to lock down the computer) is one of the primary tools they know to use to do that.

That's akin to saying that, as people want security on the street, mandatory strip search as soon as your exit your home is fair game.

Asking for a result doesn't give a blank-check for all the measures taken toward this result.

RHSeeger
0 replies
2h56m

I agree, but it doesn't change the fact that it's one of the primary reasons they're doing it. And "strip searches on the street" may not happen, but "Stop and Frisk" certainly is/was. And it was very much done because people were complaining about crime and safety. And it was done regardless of whether or not it was right, or effective, or even legal.

dmonitor
5 replies
6h11m

Cheating in online games (especially ones that are free) is so absurdly rampant and disruptive that you can sell gamers just about anything if it can meaningfully deter cheaters. Every now and then a Youtuber will say “kernel level anti-cheat is bad for [reasons]” and gamers will pretend to care about it until the video leaves the “For You” page.

throwaway48476
3 replies
2h22m

Because a root kit is the only way to do anti cheat? CS2 ban wave begs to differ.

wredue
1 replies
2h3m

I haven’t played valorant, so I don’t know about them, but what I can say is that definitely other anti-cheats are highly ineffective (VAC being one that is highly ineffective), with blatant cheaters going years without ever being caught.

Hell, blatant cheaters literally stream themselves cheating and their own communities do not recognize the cheating till the stream makes a mistake and selects the wrong scene. This also means that VAC methods of sending footage to random players is ineffective, as some streamers who are very obviously actually cheating do so in front of tens of thousands of people, and those people do not recognize the obvious cheating happening.

We also know game companies don’t care about cheating, as activision admitted in their lawsuit that they leave cheaters on a safe list so long as the cheaters have any semblance of an audience streaming.

throw10920
0 replies
1h8m

activision admitted in their lawsuit that they leave cheaters on a safe list so long as the cheaters have any semblance of an audience streaming

That is absolutely wild, and completely characteristic of Activision.

Do you have a link that I can share with my CoD-playing friends?

MSFT_Edging
0 replies
2h1m

I personally stopped playing CS because my friends started using an alt-launcher to avoid cheaters, which added a whole layer of complication that made the game undesirable. Ban waves aren't perfect but in my limited experience, cheaters weren't that rampant, in others experience it became intolerable.

talldayo
0 replies
2h12m

That's not the gamers asking, though. In this instance they're being taken advantage of because they have maligned priorities, and being sold an over-the-top solution they don't need. You can still detect process injection, memory injection, sketchy inputs, HID fuckery, DRM cracking, host emulation and input macros without ever going kernel-level.

Truth be told, if the exploiter-class of your game would even consider a kernel-level exploit, your game is fucked from the start. Seriously, go Google "valorant cheating tool" and your results page will get flooded with options. You cannot pretend like it's entirely the audience's fault when there are axiomatically better ways to do anticheat that developers actively ignore.

tpxl
8 replies
6h49m

Gamers arent demanding this. There are tons of ways to detect cheaters, the most effective one being human moderation. But no, companies wont do MaNuAl WoRk because it doesnt sCaLe, even though they have more than enough cash in the bank.

dgellow
7 replies
6h1m

How do you do manual moderation on a massive fast-paced game like Valorant? It’s correct, that doesn’t scale

scotty79
6 replies
5h43m

maybe not manual ... but ... log behavior, find outliers, make outliers play with outliers only

mholm
5 replies
4h19m

This absolutely happens already. The problem with finding statistical outliers is that plenty of legitimate players are outliers too. And if you're banning/segregating players for being outliers, you get a very angry player base.

Riot has a pretty indepth blogpost about their anti-cheat systems, they've had years to mature them on some of the most demanding competitive gaming platforms ever made. Requiring players install kernel anti-cheat was very far down the list of possible solutions, but that's what it came to. It was either this or stop being free to play.

choo-t
4 replies
3h51m

The server is all-seeing, if there is no way for the server to discriminate cheater from other player, then no player can possibly know there a cheater on the server, thus cannot complain about cheating is either irrational or the server-side detection is severely flawed.

mjr00
3 replies
3h26m

The server is all-seeing, if there is no way for the server to discriminate cheater from other player, then no player can possibly know there a cheater on the server, thus cannot complain about cheating is either irrational or the server-side detection is severely flawed.

It's impossible to tell in-game if a baseball player is using steroids, yet there's a laundry list of banned substances and players who got banned for taking them because the MLB believes it gives them an unfair advantage. It's called competitive integrity.

Since it sounds like you don't play games, at least not competitively, I'll clarify that "cheating" in this case isn't the obvious stuff like "my gun does 100x damage" or "I move around at 100mph" or "I'm using custom player models with big spikes so I know everyone's location" that you would've seen on public Counter-Strike 1.6 servers in 2002. Cheating is aim assistance that nudges your cursor to compensate for spray patterns in CS, it's automatic DPs and throw breaks in Street Fighter 6 that are just at the threshold of human reaction timing, it's firing off skillshots in League of Legends with an overlay that says if it's going to kill the enemy player or not. All of this stuff is doable by a sufficiently skilled/lucky human, but not with the level of consistency you get from cheating.

choo-t
2 replies
3h1m

It's impossible to tell in-game if a baseball player is using steroids, yet there's a laundry list of banned substances and players who got banned for taking them because the MLB believes it gives them an unfair advantage. It's called competitive integrity.

This is relative to meat-space, not videogame, but we could go there and say caffeine or Adderall use is cheating, thus making anti-cheat a little more invasive…

And there another difference, you're referring to professional sport. I have no problem with invasive anti-cheat for professional gamer, even better it the gaming device is provided by tournament organization.

But we're talking about anti-cheat used for all players, akin to asking people playing catch in their garden or playing baseball for fun an the local park to take a blood sample for drug test.

All of this stuff is doable by a sufficiently skilled/lucky human, but not with the level of consistency you get from cheating.

That's the point, there no difference for the other players between playing against a cheater and playing against a better player. Any ELO-based matchmaking will solve this, cheater will end-up playing against each-other or against very skilled player.

You could argue that they could create new account or purposely cripple their ELO ratting, but this is the exact same problem as smurfing.

mjr00
1 replies
2h47m

Many games have ranked ladders now which are taken fairly seriously. Success at high levels of ladder player often translates into career opportunities, especially in League of Legends.

Any ELO-based matchmaking will solve this, cheater will end-up playing against each-other or against very skilled player.

Well, first, you're wrong, because cheating only makes them good at one part of the game, not every part of the game. e.g. in League of Legends, a scripting Xerath or Karthus who hits every skillshot is going to win laning phase hard. However, scripting isn't going to help if they have bad macro and end up caught out in the middle of the game, causing their team to lose. Most cheaters don't end up at the top of the ladder, they end up firmly in the upper-middle.

Secondly, you're basically saying "cheating is OK because they'll end up at the top of the ladder." You don't realize how ridiculous this sounds?

Third, ranked and competition aside, playing against someone who's cheating isn't fun, even if you end up winning because they make mistakes that their cheats can't help them with.

You don't play competitive games, that's fine, but a lot of people do and they demand more competitive integrity than casual players.

choo-t
0 replies
2h32m

You don't play competitive games, that's fine, but a lot of people do and they demand more competitive integrity than casual players.

Little difference : I don't play competitive game with completes strangers on company run servers.

I've played competitively on community based server, with people being screened by other players and the community able to regulate itself (ban or unban players).

The problem space is vastly different, you don't need intrusive ring 0 anti-cheat for this.

The whole kernel-level anticheat stuff is a poor solution to a self-made problem by the developer : they wanted to be the one in charge of the game and servers, so they needed to slash human moderation need. They also wanted to create a unique pool of player and didn't want the community to split between itself and play how they want.

realusername
6 replies
6h12m

There's cheaters even on consoles which are vastly more locked-down than a PC.

Those technical shenanigans clearly aren't working, be ready to be disappointed if you thought that a TPM would help against cheaters. Cheaters always find a way, what those game needs is proper moderation.

Yes that does cost money but that's the only known thing that works in the long run.

brookst
4 replies
4h21m

This seems like the old “any imperfect solution is no better than doing nothing” argument. Moderation is expensive, hard to scale, and can only address problems after other users have bad experiences.

It’s like saying seatbelts are useless because some people still get hurt, so instead of seatbelts we need a lot more ambulances and hospitals.

Like any complex system, games have a funnel. These technical measures reduce (but not to zero) the number of cheaters. Then moderation can be more effective operating against a smaller population with a lower percentage of abuse.

realusername
1 replies
3h59m

Since the technical measures like TPM are very heavy, there's some better evidence needed that it reduces the number of cheaters, personally I don't buy it.

On the other hand, all the games / servers I've seen which are successful against cheater have some very good moderation.

vel0city
0 replies
3h4m

Just see Valorent vs Counterstrike. Similar levels of popularity, similar kinds of cheat concepts. One has a kernel level anti cheat and has few cheaters, one doesn't and is overrun by cheaters.

Look at Counterstrike with regular VAC based matchmaking and then with kernel level anti cheat in FACEIT. One is overrun with cheaters and one isn't. It's the same game.

choo-t
0 replies
3h31m

This seems like the old “any imperfect solution is no better than doing nothing” argument.

Isn't this the argument used against non-kernel-level anticheat and server-side anticheat in the first place ?

card_zero
0 replies
2h45m

It’s like saying seatbelts are useless because some people still get hurt

Alternatively, it's like saying poisoning your customers is a bad way to reduce complaints, because some of them survive. Matter of perspective.

throwaway48476
0 replies
2h20m

TPM security is broken on a lot of motherboards too.

bogwog
1 replies
3h36m

Gamers don't want cheaters, but gamers also don't want malware. Some people won't care, others will care. The real problem is that publishers don't give anybody a choice on this. They sneak these invasive anti-piracy measures into their games without asking since they don't want to fragment their player base.

The reasonable, fair, common-sense pro-consumer thing to do is to split the online play in two: a non-anticheat server and an anti-cheat server. Players can opt-in to installing a rootkit/sharing their SSN/whatever if they want to play on the hardened server. This costs nothing, and makes all types of gamers happy.

But doing this has less upside for the publisher than forcing anti-cheat on everyone. The only risk is that they might get dragged through the mud by a handful of influencers peddling impotent rage to viewers who are just looking for background noise while sleepwalking on their Temu dopamine treadmill live service of the month.

throw10920
0 replies
1h9m

The reasonable, fair, common-sense pro-consumer thing to do is to split the online play in two: a non-anticheat server and an anti-cheat server. Players can opt-in to installing a rootkit/sharing their SSN/whatever if they want to play on the hardened server. This costs nothing, and makes all types of gamers happy.

This is a very good point! And I'd like to point out that there is an analogue to the problem of smurfing in online video games, and the corresponding solution, which is to require semi-unique ID to play (e.g. a phone number which can only be tied to one account at a time with a cool-off period when transferring between accounts). Valve does this for Dota 2, and smurfing is far, far less common than it is in League of Legends.

Some League players complain that they don't want to give their phone number to Riot (which is entirely reasonable given that it's a subsidiary of Tencent), but if enough people don't want that, then Riot could simply split the ranked queue into two: one where (soft, ie phone #) identity verification is required, and one where it isn't.

Riot won't do this, though, not because it wouldn't fix the problem (it would, as demonstrated by Valve), but because they profit from smurf accounts buying skins.

heraldgeezer
0 replies
7h4m

But it allows Windows 10 without TPM.

jnwatson
5 replies
5h58m

And why is that? It isn't for DRM (the game is free). It is for anti-cheat, and it is great.

The libertarian maximalist i-can-do-what-i-want-with-my-computer ignore the many use cases where I want to trust something about someone else's computer, and trusted computing enables those use cases.

Unai
3 replies
5h20m

It is for anti-cheat, and it is great.

How is it great? Vanguard is extremely invasive; having kernel access, you have to relinquish your PC to this chinese-owned company at all times (whether you're playing the game or not), and just trust in their good faith.

And for what? Cheaters are more rampant than ever, now that they have moved to DMA type cheats, which can't (and never will) be detected by Vanguard.

So you give away complete control of your PC to play a game with as many cheaters as any other game. I wouldn't call that "great".

notdisliked
2 replies
4h24m

I don’t think you can make the argument that the amount of cheaters using DMA is “just as many” as in a game with a less restrictive anti cheat, allowing cheaters to simply download a program off the internet and run it to acquire cheats. The accessibility of DMA cheats is meaningfully reduced to the point that I would guess (only conjecture here, sorry) the amount of cheaters is orders of magnitude less in an otherwise equivalent comparison.

Now, the amount of DMA cheaters may still be unacceptably high, but that’s a different statement than “the same amount as”.

So, it’s not “giving up something for nothing”, it’s giving up something for something, whether that something is adequate for the trade offs required will of course be subjective.

taormina
0 replies
3h48m

I don’t know, the number of cheaters appears to be non-zero and present enough in my games. Why give any random game studio kernel level access to anything? There are absolutely server-side solutions, likely cheaper solutions because the licensing fees for the anti-cheat software aren’t cheap.

We gave up something real. But it has not been proven whether we got anything. Maybe we got nothing, maybe we stopped a few of the laziest cheaters, but we still see tons of cheaters. The number of possible cheaters is based off the quality of the software. No amount of aftermarket software will magically improve the quality of your game in a way that 100% deters cheaters. I’m positive that their marketing claims they reduce cheaters by an order of magnitude, but I have not observed them successfully catching cheaters with these tools.

Unai
0 replies
3h59m

Yeah, valid point.

You're right, a game with no anti-cheat or a bad one will have more cheaters. But as you said, it's about the tradeoff, and that's what isn't "great". It was for a period of two years or so, since the tradeoff was "lose all control of your PC by installing a rootkit, play a game completely free of cheats", which was compelling, but now that the game isn't sterile anymore it's hardly worth it, at least for me.

__MatrixMan__
0 replies
4h19m

Is it so radical to want to be in control of your stuff? What are these use cases where we need to have third parties in control?

I don't really buy the gaming one, in every other domain where a community of people are gathering to do a thing they enjoy together it's on the community and not the tool maker to figure out how to avoid bad behavior. If you don't wanna play with cheaters then just play with somebody else.

dangus
4 replies
5h29m

People who are concerned about this should realize: Microsoft will never create a situation where alternative operating systems can’t be installed. They already went through the antitrust ringer on that issue. They don’t even control what hardware vendors do for the most part.

This requirement will only hit multiplayer games where cheating and security threats are rampant.

Also, if you have a PC with secure boot enabled, there are popular Linux distributions like Ubuntu that have a signed key. Or, you can add a signing key to the firmware, depending on your hardware. And of course, most commercially available PCs will let you disable secure boot entirely.

(Most multiplayer games with anti-cheat software don’t really work on Linux anyway.)

AshamedCaptain
3 replies
5h4m

Microsoft will never create a situation where alternative operating systems can’t be installed. They already went through the antitrust ringer on that issue.

They have shipped ARM Surfaces where alternative operating systems could not get installed, enforced with Secure Boot permanently on. Have they been through any such "antitrust ringer" in the past 10 years?

Also, if you have a PC with secure boot enabled, there are popular Linux distributions like Ubuntu that have a signed key

Note that there's one key MS uses for Windows and one key they use for everything else. They actually advise OEMs not to install this second key by default ("Secured Core" PCs), and some vendors have followed the advice, such as Lenovo. Resulting in yet another hoop to install non-MS OSes.

Even recently, a Windows update added a number of Linux distributions to the Secure Boot blacklist, resulting in working dual boot systems being suddenly cripped. Of course, even _ancient_ MS OSes are never going to be blacklisted.

ZeroWidthJoiner
1 replies
3h29m

They actually advise OEMs not to install this second key by default ("Secured Core" PCs), and some vendors have followed the advice, such as Lenovo. Resulting in yet another hoop to install non-MS OSes.

True, 3rd party not trusted by default is a "Secured-Core PC" requirement, but so is the BIOS option for enabling that trust [0]. On my "Secured-Core" ARM ThinkPad T14s it's a simple toggle option.

Even recently, a Windows updated added a number of Linux distributions to the Secure Boot blacklist, resulting in working dual boot systems being suddenly cripped. Of course, _ancient_ MS OSes are never going to be blacklisted.

Actually they are in the process of blacklisting their currently used 2011 Windows certificate, i.e. the Microsoft cert installed on every pre-~2024 machine, also invalidating all Windows boot media not explicitly created with the new cert. It's a manually initiated process for now, with an automatic rollout coming later [1].

It'll be very interesting to watch how well that's going to work on such a massive scale. :)

[0] https://learn.microsoft.com/en-us/windows-hardware/design/de...

[1] https://support.microsoft.com/en-us/topic/kb5025885-how-to-m...

AshamedCaptain
0 replies
3h9m

True, 3rd party not trusted by default is a "Secured-Core PC" requirement, but so is the BIOS option for enabling that trust

As I said, yet another increase in the number of hops for no reason.

Before you say anything else: until this you could install _signed_ Linux distributions without even knowing how to enter your computer's firmware setup. Now you can't.

The trend is obviously there. First, MS forced Linux distributions to go through arbitrary "security" hoops in order to be signed. Then, MS arbitrary altered the deal anyway. Even mjg59 ranted about this. And the only recourse MS offers to Linux distributions is to pray MS doesn't alter the deal any further.

Maybe at no point they will make it impossible on x86 PCs, but they just have to keep making it scary enough. And in the meanwhile keep advertising how WSL fits all your Linux-desktop computing needs. While at the same time claim they have nothing against opensource.

Actually they are in the process of blacklisting their currently used 2011 Windows certificate

No, they are NOT in the process, and that is precisely what I was referring to. They have not even announced when they are going to even start doing the process. All you quoted is instructions to do it manually. So I'll believe it when I see it.

And besides, just clearing the CMOS is likely to get you a nice ancient DBX containing only some grub hashes on it, and the Windows MS signature on DB. Not so much luck for the MS UEFI CA signature, as discussed above. So "recovery" will be trivial for Windows, not so much for anyone else..

delfinom
0 replies
1h5m

You can in fact disable secure boot on the arm surfaces.

The problem is nobody really has put enough effort to port Linux to it. Some people started but haven't gotten very far

https://github.com/orgs/linux-surface/projects/1 https://github.com/linux-surface/aarch64-firmware https://github.com/linux-surface/aarch64-packages

, a Windows update added a number of Linux distributions to the Secure Boot blacklist

It was due to a bug/and or not being able to detect all manners of dual boot correctly.

The goal was not to blacklist old distros, it was to blacklist vulnerable boot managers

Microsoft's response and fixes were provided: https://learn.microsoft.com/en-us/windows/release-health/sta...

lupusreal
3 replies
6h25m

If it's software your job requires, that's one thing. But games? Just play different games, or get a different hobby. You have a choice so exercise it.

beeboobaa3
1 replies
3h33m

First they came for the socialists, and I did not speak out—

Because I was not a socialist.

Then they came for the trade unionists, and I did not speak out—

Because I was not a trade unionist.

Then they came for the Jews, and I did not speak out—

Because I was not a Jew.

Then they came for me—and there was no one left to speak for me.

lupusreal
0 replies
2h14m

Financially supporting games which do a thing you disapprove of is so counter productive it defies rational explaination. You aren't "speaking out", you're joining the party and paying membership dues. How could you get so twisted around? Brain damage, that must be it.

AshamedCaptain
0 replies
6h14m

Software doesn't require it so far because these devices are "uncommon" (i.e. for example, not on server hardware, not usually virtualized).

But guess what is happening now that MS requires TPM for Windows? All virtualizers now have some support for TPM. The time will come.

croes
20 replies
7h33m

And Windows PCs are still not safe.

So either way it fails it's purpose

dist-epoch
18 replies
7h26m

Most Windows PCs have Secure Boot enabled the many have the drives encrypted with Bitlocker.

doubled112
17 replies
7h12m

What does that do for me to stop malware? Bitlocker is only protecting an offline system

Also consider that some keys for Secure Boot have been compromised.

dist-epoch
16 replies
7h8m

So I guess then your computer does not have a form of Secure Boot enabled, and your drives are not encrypted. Makes sense, more secure.

doubled112
15 replies
6h59m

I’m using Linux and LUKS but have never been convinced Secure Boot adds anything for me. It does sometimes add extra steps though, or block a driver from loading.

dist-epoch
12 replies
6h49m

What does that do for me to stop malware? Bitlocker is only protecting an offline system

LUKS also only protects an online system. So why are you using it?

Oh, I think I know, if you are on Windows it's bad to use BitLocker because it's made by Microsoft and it doesn't protect against malware, but if you're on Linux of course you use LUKS, it's a sensible thing to do. Got it.

doubled112
10 replies
5h54m

Back in my retail computer technician and sales days, it wasn’t uncommon for somebody to lose their Bitlocker keys, and encryption did what it was designed to do - make the data unreadable without them. Sometimes they didn’t even understand what they enabled.

To that customer, Bitlocker itself was a threat.

In my small sample size, I’ve seen that more often than lost laptops. I’ve also seen many more malware infections.

Tying encryption to the TPM, which is the default, makes it easier to lose those keys. With LUKS I choose my own password.

It’s an important implementation difference, especially if it is going to do it by default. Warning a person “you will lose all data if you don’t write this down” in big bold red text is sometimes not enough.

Does tying those keys to your MS account fix that failure method?

EvanAnderson
9 replies
5h38m

Does tying those keys to your MS account fix that failure method?

Yes. Bitlocker recovery keys are escrowed to the Microsoft account. I've relied on this recover data from a family member's PC when it failed and they had unknowingly opted-in to Bitlocker (a Microsoft Surface Laptop running Windows 10 S Mode).

r2_pilot
8 replies
4h26m

> Does tying those keys to your MS account fix that failure method? >Yes. Bitlocker recovery keys are escrowed to the Microsoft account.

Which then opens the door to other attack vectors, even government.

doubled112
4 replies
3h46m

I’d imagine most people would like some insurance in the event of loss or theft, but are not worried about government.

I’m vulnerable to the $8 wrench attack, but enjoy knowing it is only a VISA problem if I leave it a laptop the bus.

seabass-labrax
2 replies
1h46m

I'm genuinely curious to know how VISA helps (or doesn't) in your analogy - what is a 'VISA problem'?

vel0city
0 replies
35m

VISA as in the credit card not a travel permit

doubled112
0 replies
1h17m

Mostly a joke, but I swipe a card and the problem goes away. No need to worry anymore.

r2_pilot
0 replies
2h54m

I mention that only because it's one avenue. I figured obviously on a place like Hacker News that malicious agents aside from government could also compromise the security of 3rd party-held keys; as always security is a matter of difficult tradeoffs and anticipated threat categories.

vel0city
2 replies
2h56m

As opposed to just not encrypting their data at all and letting everyone who ends up with the drive have their data.

So one scenario, everyone can access the data if they get the drive. The other, the government might get Microsoft to release the encryption keys.

r2_pilot
1 replies
2h38m

As opposed to just not encrypting their data at all and letting everyone who ends up with the drive have their data.

You are presenting a false dilemma where either Bitlocker is in use or the drive is entirely unencrypted; there are other ways to ensure data integrity in the face of physical compromise.

whyoh
0 replies
1h55m

1. It's not a false dilemma, it's more of a question of how to handle the "average Joe" user that doesn't know how to store encryption keys. I don't like how this automatic encryption is implemented, by the way, but sending the keys to MS servers is not the worst idea ever.

2. Bitlocker can totally be used without a MS account and without sending keys anywhere and without TPM... But seeing how most people fail to RTFM we're back to point 1.

croes
0 replies
6h39m

The point is Linux doesn't enforce useless hardware that on top could be used against the user.

Same with MS's recall feature.

A Windows PC is just C but not P anymore.

titannet
1 replies
4h52m

Secure Boot makes persisting malware in the kernel fairly difficult. Which IMHO made sense coming from Windows 7 where driver rootkits and boot kits where trivial. With today's main threat model being encryption malware I would agree that it doesn't add all that much for most people.

AshamedCaptain
0 replies
4h13m

It really doesn't prevent anything like that, not even remotely. First, to do any type of persistence that would be detected by Secure Boot, you already require unencrypted, block-level access to the disk drive, possibly even to partitions outside the system drive. There are a gazillion other ways that malware can persist if you already have this level of access and none would be detected by Secure Boot. If you were able to tamper with the kernel enough to do this in the first place, you can likely do it on each boot even if launched from a "plain old" service.

layer8
0 replies
4h3m

More accurately, unbreakable security as enabled by hardware TPMs also enables unbreakable vendor lock-in like we have with iOS. Pick your poison.

ineptech
0 replies
3h27m

People will keep saying it, because that ratchet only seems to go one way. Consumer access to general purpose computing is something we take for granted, but every year it seems like there's a bit less of it, and once we lose it we will never get it back.

heraldgeezer
0 replies
7h26m

For now. The cogs will turn slowly towards our demise.

beeboobaa3
0 replies
3h34m

For now. It's not ubiquitous enough yet. Games are already starting to require secure boot, the rest will follow in a few years.

heraldgeezer
15 replies
7h41m

does anyone still believe that Pluton, also copy-pasted from the Xbox, is about end user security?

I never did. The worst part is explaining it to people drinking the MS coolaid. I'm an MS admin so people at work love Win11, Intune etc all that max lockdown shit. To me that's not what Windows is about, for me Windows is excellent because of the admin tools and backwards compatibility. But hey that's just me.

Proton will be another TPM thing, introduce it, wait 5 years, then mandate it. They have time.

criddell
12 replies
7h34m

Another TPM thing? What problem do you have with the TPM?

1oooqooq
5 replies
6h50m

TPM end game is to have identity tied to a device on pcs, just like the monopolies already have on Android and IOS.

you know how google and apple dropped actual totp 2nd factor for their own accounts and force you to sign on another device to confirm signing on new devices? same thing.

dangus
3 replies
5h34m

Apple has SMS if you don’t own an Apple device. In fact, they require SMS to set up 2FA.

They probably dropped totp because non-technical people can’t figure it out.

olyjohn
2 replies
5h18m

SMS is not really great.

throwaway48476
1 replies
2h24m

SMS is trivially exploitable. It has negative security value.

ivewonyoung
0 replies
28m

Trivially? How?

lutoma
0 replies
2h27m

You can use FIDO2 keys as 2nd factor for Apple accounts now

heraldgeezer
2 replies
7h27m

It being a Win11 requirement. It failing and triggering Bitlocker on our machines. It's just shit :) No I don't have another solution. Let me complain.

dangus
1 replies
5h33m

What garbage hardware are you running where TPM is failing?

kotaKat
0 replies
5h3m

Every Windows Update that Lenovo kept pushing UEFI updates on their shiny new X13s with the Snapdragon and the Pluton chip in it kept tripping Bitlocker on every update.

So, uh... Lenovo?

botanical
1 replies
3h26m

Hundreds of millions of perfectly good PCs are going to be end-of-life due to this.

rolph
0 replies
3h18m

-no not end of life, end of microsoft.

a1o
0 replies
5h23m

The TPM thing that got hacked the other day?

rkagerer
1 replies
5h51m

But hey that's just me.

There are more of us out there!

4ggr0
0 replies
5h14m

There are literally dozens of us!

dgellow
1 replies
7h47m

I may be naive, but I still do. Skepticism is warranted, yet outright dismissal based on conjecture is its own brand of fallacious reasoning. Can Microsoft potentially benefit? Certainly. But that doesn't negate the possibility of genuine user security motivations and benefits for end users

exe34
0 replies
6h43m

Can Microsoft potentially benefit? Certainly. But that doesn't negate the possibility of genuine user security motivations and benefits for end users

it's important to ask which one of the motivations will allow them to lock users down and ask for ongoing rent. one of these two will, and that's what will always drive the decision.

Tepix
14 replies
5h23m

So, just stating the obvious, you can now (¥) download all xbox games directly from the microsoft store for free? I.e. the xbox is - for now - as completely hacked as the PS Vita?

(¥) you might have to figure out some details

simonjgreen
6 replies
3h39m

Total tangent, but extremely interested in the use of the Yen/Yuan sign as a footnote marker. Is there some history here I’ve overlooked or is this just arbitrary?

Tepix
4 replies
3h18m

Haha - i was looking for ¹, ² or § but couldn‘t find them on my german ipad onscreen keyboard, so i improvised.

bratwurst3000
2 replies
3h16m

you have tp hold a key longer and then there it is. i think it was „s“

isametry
1 replies
3h10m

Typing this from a German iPad keyboard. It’s the ampersand key (& → §).

gcr
0 replies
3h0m

oh interesting, using "section" as footnote marker is more alien to me than using yen

AStonesThrow
0 replies
9m

I learned BASIC programming on a VIC-20, and I typed in so many "A$, B$, C$", for decades thereafter I pronounced "$" as "string" ("A-string, B-string", etc); it got weird as I discussed Perl scripts with coworkers...

bewaretheirs
0 replies
3h19m

I've not seen it used this way before but it is similar enough to the dagger and double-dagger symbols that the intent to use it as a footnote marker is clear.

ryx
6 replies
3h55m

Yep. This seems to be the most overlooked part of the article, although maybe the most interesting.

Unfortunately not for anyone who has activated the auto-update feature on his/her Xbox, as the latest system software version seems to include a higher kernel version than supported by the collateral-damage exploit.

38
5 replies
3h3m

Exactly why you should never, ever, enable auto update, for anything. Too often it ends up breaking something or patching something you don't want patched. It allows a profit seeking company to enable or disable software functionality on your device, regardless if it's in your interest.

indrora
4 replies
2h39m

It should be noted that unless you've modified an Xbox One, from what I understand you cannot stop it from auto updating unless you permanently disconnect it from the internet (which will cause your licenses to eventually expire, in the year timespan or so), new launch games won't run (they're tied to a minimum version of the OS).

__MatrixMan__
3 replies
2h18m

Wow, so it's a ticking time bomb, that should be illegal.

seabass-labrax
2 replies
2h0m

I agree that the device updating without your consent should be illegal, but new games requiring the updates seems fair enough: the Xbox can still run all of the games it was advertised to be able to do so at launch, and if game developers could not rely on the presence of system updates, Microsoft would just release an entirely new, incompatible Xbox instead. I think that updates are fine so long as you can update and roll back whenever you want to.

Zambyte
1 replies
53m

Depending on if you consider "authorization" to require consent or informed consent, it already is illegal behavior under CFAA.

klodolph
0 replies
34m

That would require a pretty creative interpretation of the CFAA.

thrownawaysz
13 replies
6h29m

MAS (which is also hosted on Github) is the perfect example of Microsoft not caring about end user piracy. Just use it.

a1o
3 replies
5h26m

I have no idea how to get access to LTSC Windows without it. I have bought Windows PRO keys in case someone asks one day, but as a person, I really don't know how to get the not annoying Windows that is available for companies.

thrownawaysz
0 replies
5h15m

I once went down this rabbithole ("I use LTSC for years might as well buy a legit copy finally") and... it was almost impossible. You need to buy at least 5 licenses through volume licensing but you also have to be a business (can't buy it as a natural person). Then there were some other thing about standalone version, upgrade, subscription etc.

So yeah LTSC was never meant to be available for single desktop users at home yet it's best version of Windows available.

olyjohn
0 replies
5h20m

The pro keys won't cover you if someone asks. You're not licensed for LTSC and you can't have it without an enterprise agreement. It's still piracy. you might as well have not even paid for the pro keys.

nicman23
2 replies
5h46m

more like the license process is so bad that they dont bother to go after them

sneak
0 replies
5h37m

There is ultimately no way to get a good license process on consumer PCs. The owner and operator of the hardware is also the adversary. It’s like DRM for video and other content: you are giving the ciphertext and the keys to the attacker. It’s only a matter of time until it is broken.

SV_BubbleTime
0 replies
1h38m

the license process is so bad that they dont bother to go after them

For a person, yes go for it they won’t bother.

For a company… we have had some annoying MS audits. So how everything has to be retail WITH the cards. I have a stack ready for our next audit if it ever happens again.

diggan
2 replies
5h48m

Maybe it's beneficial for Microsoft that solutions like that are FOSS so they can more easily inspect the code for prevention purposes in the future?

npteljes
0 replies
2h37m

Instead I think that they let people use it unauthorized, so that Windows is even more entrenched. Same with what Adobe did with Photoshop. These companies are lucky that their product gets home and office use as well, because they can let the noncommercial use slide, and just squeeze the office users more.

It's more of a business move, than a technical move. Microsoft has plenty of capable people, they don't need such software to be FOSS to successfully inspect it.

fallingsquirrel
0 replies
5h25m

I think Microsoft is just purposefully lax about enforcing their own trademarks on their own properties. It could be due to organizational memory of their antitrust case. It could be to avoid bad publicity (like the recent spat where youtube took down a video teaching people how to use adblockers).

Another example of this: the leaked Windows source code is available straight from GitHub.

indrora
1 replies
2h31m

In the long run, pirated copies of Windows are noise level: The vast majority of people are going to get a license via an OEM (which survives reinstallation), businesses aren't going to risk running unlicensed windows machines (especially if they're paying for it elsewhere) and have easy means to acquire OEM licensed machines that are supported by the OEM for parts & service, and people who run an up to date but pirate-licensed copy of Windows are at least running an up to date version instead of sitting on an EOL copy that is barely getting security updates.

Allowing piracy at that level is actively safer in the long run.

hakfoo
0 replies
1h4m

I suppose the other aspect is the gradual death of the white-box PC shop.

The large OEMs have contracts to pay 9 cents per license.

They'll never crack the individual enthusiast building his own PC from Newegg parts and installing a hack, but he's small potatoes.

But back in the day, there there was a fair chance your local midsize business, government, university, didn't necessarily buy from Dell or HP-- they bidded out a few hundred PCs to a local shop, which had both the motivation and technical knowledge to use the same license key on each one, and the scale where it could represent significant lost revenue.

Introducing activation was probably a significant sabotage for them. Although I'd suspect the stick on license certificate was almost as big a deal in that regard.

libertine
8 replies
8h8m

This sort of thing over decades has been the best distribution and communication channel for Windows.

23B1
7 replies
5h20m

Does not apply to most other software.

libertine
6 replies
3h49m

Yes, but I think it works exceptionally for other software, like games!

One example that stands out was the hacking/modding scene of the GTA Vice City with Multi Theft Auto, and even GTA SA, which gained a massive player base that would have never experienced the game and created emotional bonds with it. I can't prove this of course, but I bet a huge portion of the GTA V success was from users who played a moded version of the game in the past "for free".

Another example is the Adobe Suite, like Photoshop, and Illustrator, which allowed many people to become proficient with the Adobe tools and be part of a qualified workforce using that same suite of tools. A lot of these professionals from low-income countries would never had access to these tools otherwise in their formative years.

Price is a barrier to entry for many users who wouldn't have paid for the software.

23B1
5 replies
2h17m

Price is a barrier to entry for many users who wouldn't have paid for the software.

This is what demos, student licenses, etc. are for. I don't care what your justification is, property theft is wrong.

topato
0 replies
1h34m

Haha, yeah, I'm pretty sure there would be a hell of a lot less working professionals using the Adobe suite today if we had all used Adobe's generous 14-day trial to get to grips with Photoshop or Flash or Dreamweaver when we were 12 or 13 years old. Or enrolled in University, I guess?

I would expect Adobe would be nothing but a forgotten brand name list to the annals of time at this point, considering their Suite has been the most pirated application every year since the early days of Windows 95... And yet....

throw10920
0 replies
1h15m

I wouldn't use the term "property theft", as even though there's a very clear analogue to IP and digital economics for anyone who cares to think about it, pro-piracy pedants will gladly jump on the term (which is strongly tied to physical property) to avoid addressing the problem itself. This problem doesn't happen as much with other terms like "theft", "IP theft", and "piracy".

mdaniel
0 replies
1h46m

property theft is wrong.

It sure is, and those people should promptly return their stolen Photoshop bits to the front door of any local fire station so Adobe can put them back into their bit warehouse and ship them to paying customers next day air

ChumpGPT
0 replies
2h1m

1st world opinion.......

123pie123
0 replies
1h16m

it is NOT 'property theft', since nothing has been stolen, just copied

the term you want is Copyright infringement

throwaway48476
5 replies
2h28m

Can this be used to enable the HEVC extension without a M$ account? It's so frustrating they can't license the patents as a lump sum.

throwaway48476
0 replies
1h42m

Awesome

e4m2
0 replies
1h51m

You don't need this exploit. You could use a media player that doesn't need MS codec packs, but assuming this is not an option:

1. Go to https://store.rg-adguard.net.

2. Paste in https://apps.microsoft.com/detail/9n4wgh0z6vhq.

3. Change ring to "Retail".

4. Download the file with an "appxbundle" extension.

5. Install it (might need to enable developer mode for this step; don't remember).

dist-epoch
0 replies
57m

You don't need to pay. You just need the direct link

ms-windows-store://pdp?productId=9N4WGH0Z6VHQ

ms-windows-store://pdp?productId=9PMMSR1CGPWG

ms-windows-store://pdp?productid=9MVZQVXJBQ9V

ms-windows-store://pdp?productid=9N4D0MSMP0PT

ms-windows-store://pdp?productid=9N95Q1ZZPMH4

Rinzler89
0 replies
1h22m

Why would you need it? HEVC codec ships with the driver package from your GPU vendor.

antimemetics
4 replies
8h32m

For my personal use I found it trivial to activate my Win10 Professional. I just had to change the server address for the license check and boom fully activated. Not gonna share the specifics here but you can find it easily.

I guess the method described here does „more“ since it’s much more elaborate. Not super familiar with the different levels of win licences

qilo
0 replies
6h21m

Massgrave's tools activate your licence with Microsoft's servers.

notpushkin
0 replies
8h20m

One of Massgrave’s most famous “products” is a script that performs such server activation, so if anybody wants to find it look no further than the OP article. (Although it's not too hard to perform such activation manually either!)

heraldgeezer
0 replies
7h43m

Massgrave has their script for HWID and KMS and Office activations :)

haunter
0 replies
6h27m

Not gonna share the specifics here but you can find it easily.

Did you open the link?

nicolas_t
2 replies
1h13m

Now I just wish this could give me a license to install the Lego Boost for Windows 10 app that used to be on the windows store until 2020...

From my understanding, if you have the license, then you can still download it but it's not available for new users.

nicolas_t
0 replies
11m

I tried that and it'll be great when my kid is older but the Lego Boost app has some kind of gamification built in that's honestly pretty sweet and is a good gateway I think.

Right now, I'm using an android emulator to be able to run the app on a laptop (we don't have tablets) but it's a janky experience compared to a native windows app.

loeg
2 replies
2h48m

As it turns out, data after the signature block isnt checked at all... and it can even override data that came before it. Whenever two blocks of the same type are stored together, the last one overrides all the others before it. So, if we want to change any license data, we can just make a block for it and put it after the signature block!

Amazing.

Dwedit
1 replies
1h27m

I wonder if this is the worst cryptography blunder since Nintendo Wii using 'strncmp' to validate a hash (which stops after the first matching 00 byte)

bri3d
0 replies
10m

This "check the block signature and then read another one" bug is incredibly common. I'd say it's one of the top 5 bugs I see in Validating Things. Other examples of places I've seen this recently include some variants of VW AG infotainment systems (mostly MIB2 High, I think), but it's kind of everywhere (as was the `strncmp-a-hash` method of validating an RSA-PKCS#1.5 signature).

This is probably the most egregious/impactful manifestation of it, though, especially if it applies to Xbox (which is blind speculation at the moment as far as I know - while the Microsoft Store licensing stuff seems to be copy pasta from the Xbox version, it's unclear if that's where the bug was introduced or not).

a1o
2 replies
5h16m

Does anyone knows a good way to activate MS Office on macOS ? Doesn't matter how many times I buy the thing it eventually forgets the license and calling Microsoft Support usually doesn't result in anything. One day Office starts complaining that it's not activated and then it eventually locks me out of it. It would be nice if the Office license on macOS actually worked but if there's an easy solution for activation I wouldn't look back.

a1o
0 replies
4h41m

Thank you!

bloqs
1 replies
4h51m

So this is now patched? And this works on xbox store too?

efilife
0 replies
4h41m

It is said in the article that it's patched, multiple times

stepupmakeup
0 replies
1h53m

What an extremely unprofessional-sounding article... "trolling", mocking legitimate security researchers for discovering it before them, Discord screenshots and even leaked source code.

layer8
0 replies
3h58m

If I read this correctly, Microsoft will be able to reduce the applicability of the temporary-license signing key, meaning that you probably won’t be able to generate permanent licenses for long.

Jerrrrrrry
0 replies
2h22m

ironically, I will be using un-ironically to play Guitar Hero games that I have the physically discs to, on retail hardware, that has the games installed, but not "licensed" to play without physical tethering of the disc in the failed DVD drive.

The double irony is that, even if it works, I may not be able to read my own game-saves since the Console's own public key is on the revocation list. I could sidestep this by resigning the CON files with the default value, 0.

The triple irony may be forthcoming yet. this all looks very familiar indeed.

fuckin brilliant