• XLE@piefed.social
    link
    fedilink
    English
    arrow-up
    61
    arrow-down
    1
    ·
    29 days ago

    This crack sounds too scary to use. Impressive, but scary.

    As usual for any DRM company or publisher, Irdeto also claimed that downloading games with the bypass is a security concern, but this time around, the company has a valid point.

    Using the hypervisor bypass, even in its latest incarnation, requires users to… [install] a community-made hypervisor (HV) with Windows running on top of it. This HV fakes responses to the checks that Denuvo makes, and runs with higher permissions… than the operating system itself and has full, nearly untraceable access to hardware and software.

    • underisk@lemmy.ml
      link
      fedilink
      English
      arrow-up
      62
      arrow-down
      1
      ·
      29 days ago

      If you think that’s scary wait til you hear about what it’s circumventing is capable of.

      • ColeSloth@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        28
        arrow-down
        1
        ·
        29 days ago

        On a technical level… Less.

        The exploit completely guts and opens up your system to pretty much anything. More access than even denovo.

        Use the included scripts (or manually do it yourself or make your own script) to re enable everything after you’re done playing the game and reboot the system. I’d also leave the router unplugged while you play. This denovo bypass seriously leaves your system super unsecured. Only get your games using this exploit from very trusted sources and don’t be lazy about enabling everything again and rebooting before plugging back into the internet.

      • XLE@piefed.social
        link
        fedilink
        English
        arrow-up
        8
        ·
        29 days ago

        Nasty stuff I don’t want on my computer either. As an amateur, was really hoping the cracks would remove it, not circumvent it…

    • JATth@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      28 days ago

      I wouldn’t touch this without air-gapping the machine it’s run on. The funny thing here is that Denuvo can’t do much to prevent this hack.

      The HV is intentionally malicious and modifies the guest on the fly to archive the Denuvo hack. The hack requires to disable all major security protections in the victim OS, so the HV can more freely poke at the victim kernel. A jne-instruction to check if running under a compromised HV? It’s now a nop-instruction.

      The HV has access to everything that is plugged in physically, or run on top of it. In theory it e.g. extract encryption keys of https connections from any process in the guest.

      • LiveLM@lemmy.zip
        link
        fedilink
        English
        arrow-up
        10
        ·
        29 days ago

        Not really? No reason it couldn’t just read those separate partitions too

    • LincolnsDogFido@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      ·
      28 days ago

      Well, you could potentially get a cheap office special PC to use as a guinea pig. (Depending on what it takes to run this software)

      • XLE@piefed.social
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        28 days ago

        The problem with well-coded malware is it won’t execute unless it thinks it’s not being watched. And based on everything else in this article, it sounds like you’d also be opening your computer up to other parties exploiting security holes in the process.

        So a separate computer might work, but it would have to stay separate.