Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
Though depending on local laws, the consumer agency route can produce good results.
Edit: I really can't type on a mobile, sorry. Fixed errors.
Do you have to approve installation of a driver with a UAC prompt when you plug a USB device into your system?
Just because a program can do something doesn't mean the code will allow it to.
Every game on Steam technically has the ability to delete your entire documents folder. The set of actions the game's code can do includes that. But none of them will because the code doesn't say to do that.
Ability and willingness are two different things, even for computer programs.
The scary part about an unknown USB stick isn't that it could have a virus on it. Modern operating systems do not run untrusted code automatically when a drive is attached for exactly that reason.
The scary thing is that it might not be a USB storage device inside there. It could just be a bunch of capacitors that take power from your computer's USB charging functionality, build up an enormous charge, and send a shock through your computer that damages all of its circuits.
It could also be a device that pretends to be a USB hub with a bunch of other devices attached: a mouse, a keyboard, some printer with vulnerable drivers, etc.
Those drivers aren't all pre-installed. They're high-level filter drivers. They're loaded into and unloaded from the kernel on-demand.
They're also not always fetched from Windows Update. In some cases, e.g. printers, they can actually be fetched from a networked print server or a networked printer directly as a binary payload. Trusted, because signed with a trusted certificate. And it's the same with drivers from Windows Update; trusted, because signed with a trusted certificate.
They run the driver immediately though, when they can find a corresponding one and it's signed with a trusted certificate. That's the point I'm making. There are ways to load kernel modules without the user needing to already have administrative permissions or needing to raise a UAC prompt. All it requires is that it's implemented as a particular type of driver and that it's signed with a trusted certificate.
EA doesn't. But others might have reasons to try and find a weakness to exploit in EA's programming, which may well be every bit as shoddy as their regular programming for the games themselves, which would allow that other party to inject code into the kernel and allow them to e.g. place a rootkit.
-- that you must trust to not do anything bad, and to not allow any other party to be able to misuse them to do anything bad.
It's the second part which is the actual problem!
Took a while to dig this one back up:
https://www.pcgamer.com/ransomware-abuses-genshin-impacts-kernel-mode-anti-cheat-to-bypass-antivirus-protection/
https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html
(emphasis mine)
If that program contains a flaw that allows arbitrary code to be injected, it can do whatever an attacker wants it to do though.
Or in case of the kernel-mode driver that used to ship with Street Fighter V:
it legitly had the ability baked in as a feature to execute code residing in memory in user space under kernel space. User space callers would simply pass the pointer of the start address of the code in user space to the kernel-space module, relying on the module to temporarily disable the Supervisor Mode Execution Protection (SMEP) hardware feature that normally protects against this kind of very dangerous pattern.
https://www.theregister.com/2016/09/23/capcom_street_fighter_v/
I appreciate your help though. Earlier I mention the two PCs alternative, like one PC for Linux only, and another one for Windows only. One personal PC, and a second gaming PC (without personal stuff). I could also do dual boot with one PC, but I rather have two. For me I would not be gaming so much on the Linux PC, I would use it for web browsing and personal projects, music production etc. And I did some research, seems like most DAWs also work pretty good inside Linux using Wine (for Windows only applications).
Easier and more straightforward than getting kernel level to then try to steal the same content.
And this is the kind of thing I refer when talking about 'disinformation'.