Hacker News new | past | comments | ask | show | jobs | submit login

In this scenario couldn't you just run it in a VM? Or would their software trip once they realize they can't see vacation photos on your desktop?



The article states the software won't run in a VM


This kind of software almost universally detects and refuses to run in VMs.


It is not hard to create a hardened VM. If anti-cheats can't detect it, neither can some off-brand user mode teaching software


It's harder than you think, and remember that the consequence is not “I can't play a game until I revert my config” but “I was reported to my college for an ethics violation and now my $$$ degree is in question” or “My professional organization has been told that I attempted to cheat and the certification I need to keep my job is in jeopardy”.

There are many things which are technically possible which are not a favorable cost-benefit for most people. This is in the same category as those guys who relied on technically being able to fly without showing ID to the TSA — there's a reason why it was mostly affluent white men flying solo, because the potential downsides are much greater for most other categories.


Got some links to resources about doing this? Would be interested in having a hardened VM on-hand for things like this.


KVM is probably your best bet on Linux and VMware the best on Windows. https://github.com/hzqst/VmwareHardenedLoader works for VMware but doesn't work against some modern anti-cheats, but KVM universally works against anti-cheats when configured properly with RTDSC spoofing and such


VM detection is usually pretty bad. They just look for magic strings that are easy enough to fake.


The difference between "easy to fake" and "hellishly difficult" is the authors clicking next-next-finish in VMProtect or not.


There are github repos to harden VMware against VMProtect, let alone KVM


they still have to interact the system, and make system calls.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: