Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> And yes, they probably also don't want people to keep hacking online video games, which is why Riot uses TPM attestation as an additional security measure to preventing people banned for hacking from evading bans in Valorant[3].

on most of my gaming boards you buy the TPM and plug it into the board like you would a USB connector

total cost: ~$15 (ignoring currently craziness)

if I'm a wallhacker/aimbotter how would this stop me?



Usually they ban every part they can get a SN/unique ID for, TPM being just another signal. Modular TPMs are being phased out anyhow, with new AMD and Intel chips having it built in.


that would be a shame

the hardware TPM is considerably harder to tamper with than the software "fTPM" that come built-in with the CPU

though I suppose once it gets cracked that may turn out to be a blessing for software freedom


I can't wait for CPU-built-in TPMs to get hacked, rendering entire generations of CPUs "insecure" and "tainted" to these anti-cheat and DRM systems.


As I said, it doesn't actually do much for anti-cheat besides act as a hardware ID for bans. You can still run cheats and hack your own system with the TPM fully in-tact, it's just another method to increase the cost required to get back in after being banned - now you have to have an entirely new CPU every time, at least once they fully drop Windows 10 support in \d{2} years.

There's quite literally only one potential exploit that would work for the purposes of ban-evasion: extracting the private key. Since every CPU is signed by Intel/AMD's CA, the Riot servers require your CPU attest by signing a secret message, so you'd need a surefire way to extract the private key from other machines to then spoof TPM responses using your existing hardware - that, or you have an active worker agent on other PCs proxying the attestation process.

And, if you were actually able to find a way to extract the private key on TSMC's newest process nodes, there are much more profitable ways to use that knowledge.. ie. selling it to zerodium or nation state actors that are eager to decrypt iPhones.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: