this post was submitted on 02 Apr 2026
283 points (99.6% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

68574 readers
203 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):

🏴‍☠️ Other communities

FUCK ADOBE!

Torrenting/P2P:

Gaming:


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
 

Company promises countermeasures against new DRM bypasses — zero-day game releases become norm as security concerns mount over hypervisor-based bypass

you are viewing a single comment's thread
view the rest of the comments
[–] Encephalotrocity@feddit.online 119 points 3 days ago* (last edited 3 days ago) (37 children)

Good luck

Using the hypervisor bypass, even in its latest incarnation, requires users to disable:

  1. Virtualization-Based Security (VBS): a layer that separates the Windows operating system from the its security enforcement features that run at a higher privilege level.
  2. Credential Guard: a sub-feature of VBS that keeps login credentials in an container isolated from the rest of the operating system.
  3. Driver Signature Enforcement: verification that any drivers installed in the system must have a digital signature issued by Microsoft to an identifiable company or developer, in order to prevent installing random drivers at the system level.
  4. Core Isolation / Memory Integrity (HVCI): similar to the above, but prevents any kernel-level unsigned code entirely, as well as modifications to existing signed code so programs can't attempt to mess with existing drivers.
  5. Installing a community-made hypervisor (HV) with Windows running on top of it. This HV fakes responses to the checks that Denuvo makes, and runs with higher permissions (ring level -1) than the operating system itself and has full, nearly untraceable access to hardware and software.
[–] neon_nova@lemmy.dbzer0.com 4 points 2 days ago (1 children)

If someone just has System for gaming only, is there really a risk? Shunning they only sign into game clients.

[–] sp0rk@lemmy.dbzer0.com 2 points 1 day ago

I you are considering the random hypervisor as a potential threat (which you should):

  • your auth tokens for things like Steam could be stolen, and possibly be used to make purchases with linked cards, or empty your inventory of things like CS skins, gift copies of games, etc.
  • if not fully isolated, it could be an attack vector to other machines on your LAN
  • peripherals like mic, camera, keyboard could be accessed to spy on you
  • and more...
load more comments (35 replies)