Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse

Chebucto Regional Softball Club

  1. Home
  2. Uncategorized
  3. Call of Duty and Battlefield 6 will both require Secure Boot on Windows
A forum for discussing and organizing recreational softball and baseball games and leagues in the greater Halifax area.

Call of Duty and Battlefield 6 will both require Secure Boot on Windows

Scheduled Pinned Locked Moved Uncategorized
53 Posts 38 Posters 100 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ? Guest
    Archive: https://archive.ph/2025.08.06-204234/https://www.theverge.com/news/720007/call-of-duty-pc-anti-cheat-secure-boot-windows-black-ops-7
    D This user is from outside of this forum
    D This user is from outside of this forum
    datavoid@lemmy.ml
    wrote last edited by
    #34
    Well shit, I was looking forward to bf6
    1 Reply Last reply
    0
    • ? Guest
      Secure boot requires OS kernel to be digitally signed so that’s just another way to prevent tampering. It’s not like this or any other game will be doing anything other than checking if it’s on because there’s not that much else it can be used for. Secure boot is annoying as hell if you use anything other than Windows though.
      S This user is from outside of this forum
      S This user is from outside of this forum
      sugar_in_your_tea@sh.itjust.works
      wrote last edited by
      #35
      You can load your own keys and sign whatever you want. It's not going to prevent anyone but the most unsophisticated of cheaters. What it does is prevent malicious code from being injected early in the boot, it doesn't prevent users from loading whatever code they want early in boot.
      ? 1 Reply Last reply
      0
      • S sugar_in_your_tea@sh.itjust.works
        You can load your own keys and sign whatever you want. It's not going to prevent anyone but the most unsophisticated of cheaters. What it does is prevent malicious code from being injected early in the boot, it doesn't prevent users from loading whatever code they want early in boot.
        ? Offline
        ? Offline
        Guest
        wrote last edited by
        #36
        Can you really sign your own modified Windows kernel or drivers? I don’t think that’s how cryptography works.
        S 1 Reply Last reply
        0
        • ? Offline
          ? Offline
          Guest
          wrote last edited by
          #37
          No need to require something for an OS they don't plan to support at all anyways, I suppose. 😞
          1 Reply Last reply
          0
          • ? Guest
            I mean, this is fine. Secure Boot is on everything motherboard from the last 12 years, there are very few reasons not to have it enabled and those reasons are usually edge case scenarios. Would absolutely take this over a kernel level driver.
            ? Offline
            ? Offline
            Guest
            wrote last edited by
            #38
            Motherboard TPM has been pwnd so many times. I don't want to enable attack surface and I have other means of verifying my boot
            1 Reply Last reply
            0
            • ChozoC Chozo
              The problem with this detection method is that you occasionally run into honest players catching bans for being *legitimately too good at the game*. While rare, there are some players who are accurate enough with their tracking that even professional players would assume they're cheating, and end up getting banned because the developers decided nobody should ever be that good at the game. This ends up putting a skill ceiling on a game, which is uhhealthy for a competitive game.
              ? Offline
              ? Offline
              Guest
              wrote last edited by
              #39
              Plenty of people have been banned for false positives for the current anticheat methods due to corrupted files and whatnot, so I'd rather that a few 'too good for reality' players were banned instead.
              1 Reply Last reply
              0
              • ? Guest
                Archive: https://archive.ph/2025.08.06-204234/https://www.theverge.com/news/720007/call-of-duty-pc-anti-cheat-secure-boot-windows-black-ops-7
                ? Offline
                ? Offline
                Guest
                wrote last edited by
                #40
                Fuck cheaters. I support this. I have no issues with the potential vulnerability concerns to reduce cheating. I can't even remember the last time kernel level anti-cheats resulted in data exploitation.
                ? ? 2 Replies Last reply
                0
                • ? Guest
                  EA Gets hacked and all the extra info they have been storing on me goes right to the hackers. It's also a huge back door they could sell to shady 3 letter agencies.
                  ? Offline
                  ? Offline
                  Guest
                  wrote last edited by
                  #41
                  Valid concerns, but Secure Boot does not influence that outcome. The root access is the most egregious thing here, not Secure Boot.
                  1 Reply Last reply
                  0
                  • ? Guest
                    Can you really sign your own modified Windows kernel or drivers? I don’t think that’s how cryptography works.
                    S This user is from outside of this forum
                    S This user is from outside of this forum
                    sugar_in_your_tea@sh.itjust.works
                    wrote last edited by
                    #42
                    I'm not sure about Windows specifically, I just know you can load your own keys onto the mobo. In general, a cryptographic signature is just metadata tacked onto a file, so presumably yes, you could sign the kernel yourself and load your key so Secure Boot works. The way Linux distros generally work (e.g. [Debian](https://wiki.debian.org/SecureBoot#What_is_UEFI_Secure_Boot.3F)) is to use a shim binary and chain load into their own kernel binary. An exerpt: > Starting with Debian version 10 ("Buster"), Debian supports UEFI Secure Boot by employing a small UEFI loader called shim which is signed by Microsoft and embeds Debian's signing keys. This allows Debian to sign its own binaries without requiring further signatures from Microsoft. So even if signing the Windows kernel doesn't work (I don't see why it wouldn't), you could use a loader shim like Debian does to not require loading your own keys. To be fair, I haven't read the details of Secure Boot specifically to know how it's done, I'm just going based on my understanding of PGP (about how signing works), early kernel boot, and high level details about Secure Boot. I'm sure someone sophisticated enough to design kernel-level game cheats could figure out how to make Secure Boot happy without a ton of effort from users. Secure Boot isn't designed to prevent users from doing things, it merely prevents malicious code from being loaded at boot (i.e. code that doesn't have access to the keys loaded onto the Secure Boot module).
                    ? ? 2 Replies Last reply
                    0
                    • S sugar_in_your_tea@sh.itjust.works
                      I'm not sure about Windows specifically, I just know you can load your own keys onto the mobo. In general, a cryptographic signature is just metadata tacked onto a file, so presumably yes, you could sign the kernel yourself and load your key so Secure Boot works. The way Linux distros generally work (e.g. [Debian](https://wiki.debian.org/SecureBoot#What_is_UEFI_Secure_Boot.3F)) is to use a shim binary and chain load into their own kernel binary. An exerpt: > Starting with Debian version 10 ("Buster"), Debian supports UEFI Secure Boot by employing a small UEFI loader called shim which is signed by Microsoft and embeds Debian's signing keys. This allows Debian to sign its own binaries without requiring further signatures from Microsoft. So even if signing the Windows kernel doesn't work (I don't see why it wouldn't), you could use a loader shim like Debian does to not require loading your own keys. To be fair, I haven't read the details of Secure Boot specifically to know how it's done, I'm just going based on my understanding of PGP (about how signing works), early kernel boot, and high level details about Secure Boot. I'm sure someone sophisticated enough to design kernel-level game cheats could figure out how to make Secure Boot happy without a ton of effort from users. Secure Boot isn't designed to prevent users from doing things, it merely prevents malicious code from being loaded at boot (i.e. code that doesn't have access to the keys loaded onto the Secure Boot module).
                      ? Offline
                      ? Offline
                      Guest
                      wrote last edited by
                      #43
                      You mean [this certificate](https://lwn.net/Articles/1029767/)? The one which will expire next year and leave many old machines with Secure Boot enabled, unbootable?
                      S 1 Reply Last reply
                      0
                      • ? Guest
                        You mean [this certificate](https://lwn.net/Articles/1029767/)? The one which will expire next year and leave many old machines with Secure Boot enabled, unbootable?
                        S This user is from outside of this forum
                        S This user is from outside of this forum
                        sugar_in_your_tea@sh.itjust.works
                        wrote last edited by
                        #44
                        Unbootable w/o changes, yes, assuming hardware vendors actually respect the expiration date. But that's completely separate from my point. Regardless of the solution they pick for that particular problem, users can _still_ add their own keys to Secure Boot and do whatever they want.
                        1 Reply Last reply
                        0
                        • ? Guest
                          Every Riot game requires Secure Boot for Vanguard to work. It's not unique to those two games. And what the fuck would they want with your computer anyways?
                          ? Offline
                          ? Offline
                          Guest
                          wrote last edited by
                          #45
                          They are using this to leverage their way into control over your system. They are trying to become the iOS of PC's, where you can't install or run anything Microsoft didn't collect protection money on.
                          ? 1 Reply Last reply
                          0
                          • ? Guest
                            They are using this to leverage their way into control over your system. They are trying to become the iOS of PC's, where you can't install or run anything Microsoft didn't collect protection money on.
                            ? Offline
                            ? Offline
                            Guest
                            wrote last edited by
                            #46
                            You sound like you follow QAnon...
                            1 Reply Last reply
                            0
                            • S sugar_in_your_tea@sh.itjust.works
                              I'm not sure about Windows specifically, I just know you can load your own keys onto the mobo. In general, a cryptographic signature is just metadata tacked onto a file, so presumably yes, you could sign the kernel yourself and load your key so Secure Boot works. The way Linux distros generally work (e.g. [Debian](https://wiki.debian.org/SecureBoot#What_is_UEFI_Secure_Boot.3F)) is to use a shim binary and chain load into their own kernel binary. An exerpt: > Starting with Debian version 10 ("Buster"), Debian supports UEFI Secure Boot by employing a small UEFI loader called shim which is signed by Microsoft and embeds Debian's signing keys. This allows Debian to sign its own binaries without requiring further signatures from Microsoft. So even if signing the Windows kernel doesn't work (I don't see why it wouldn't), you could use a loader shim like Debian does to not require loading your own keys. To be fair, I haven't read the details of Secure Boot specifically to know how it's done, I'm just going based on my understanding of PGP (about how signing works), early kernel boot, and high level details about Secure Boot. I'm sure someone sophisticated enough to design kernel-level game cheats could figure out how to make Secure Boot happy without a ton of effort from users. Secure Boot isn't designed to prevent users from doing things, it merely prevents malicious code from being loaded at boot (i.e. code that doesn't have access to the keys loaded onto the Secure Boot module).
                              ? Offline
                              ? Offline
                              Guest
                              wrote last edited by
                              #47
                              > I'm not sure about Windows specifically That’s quite an important omission because we’re talking about Windows. Windows won’t run kernel or driver that’s not using expected certificates, what would be the point otherwise?
                              S 1 Reply Last reply
                              0
                              • ? Guest
                                Fuck cheaters. I support this. I have no issues with the potential vulnerability concerns to reduce cheating. I can't even remember the last time kernel level anti-cheats resulted in data exploitation.
                                ? Offline
                                ? Offline
                                Guest
                                wrote last edited by
                                #48
                                How do you like your boot seasoned?
                                1 Reply Last reply
                                0
                                • ? Guest
                                  Archive: https://archive.ph/2025.08.06-204234/https://www.theverge.com/news/720007/call-of-duty-pc-anti-cheat-secure-boot-windows-black-ops-7
                                  S This user is from outside of this forum
                                  S This user is from outside of this forum
                                  supersquirrel@sopuli.xyz
                                  wrote last edited by
                                  #49
                                  Come join the community I made recently specifically for battlefield like games made by indie developers such as the superb ww2 battlefield-like **Easy Red 2** ! !indiefields@sopuli.xyz
                                  1 Reply Last reply
                                  0
                                  • ? Guest
                                    Fuck cheaters. I support this. I have no issues with the potential vulnerability concerns to reduce cheating. I can't even remember the last time kernel level anti-cheats resulted in data exploitation.
                                    ? Offline
                                    ? Offline
                                    Guest
                                    wrote last edited by
                                    #50
                                    As a Bf3 and Bf4 player, I can count the number of cheaters I encountered on one hand. I won't buy Bf6 because they implement this shit instead of giving us self hostable community servers.
                                    1 Reply Last reply
                                    0
                                    • ? Guest
                                      You mean CoD (2003) and United Offensive right? *Right?*
                                      ? Offline
                                      ? Offline
                                      Guest
                                      wrote last edited by
                                      #51
                                      We still play UO every night. Historians have their Base Assault server going during the afternoons and there is usually a CTF and S&D server populated every night (which one it is varies) We’d love to have some old players back!
                                      1 Reply Last reply
                                      1
                                      0
                                      • ? Guest
                                        > I'm not sure about Windows specifically That’s quite an important omission because we’re talking about Windows. Windows won’t run kernel or driver that’s not using expected certificates, what would be the point otherwise?
                                        S This user is from outside of this forum
                                        S This user is from outside of this forum
                                        sugar_in_your_tea@sh.itjust.works
                                        wrote last edited by
                                        #52
                                        Again, I don't know the specifics about Windows, so I can't say exactly what a cheater could or could not do. I _do_ know that kernel chaining _does_ work w/ Windows, otherwise the GRUB bootloader would be DOA. Whatever Windows does is a completely separate thing from Secure Boot, since Secure Boot only impacts early boot (i.e. the handoff from UEFI to the kernel). So getting into what Windows does and does not allow isn't particularly relevant to the discussion about Secure Boot.
                                        1 Reply Last reply
                                        0
                                        • ? Guest
                                          Archive: https://archive.ph/2025.08.06-204234/https://www.theverge.com/news/720007/call-of-duty-pc-anti-cheat-secure-boot-windows-black-ops-7
                                          N This user is from outside of this forum
                                          N This user is from outside of this forum
                                          nigelfrobisher@aussie.zone
                                          wrote last edited by
                                          #53
                                          Get on Counterstrike, lads,
                                          1 Reply Last reply
                                          0

                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • 1
                                          • 2
                                          • 3
                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups