With DMA based cheats I disagree as if you were developing a DMA based cheat you would still need to understand how the game works so you can figure out what memory adresses are for what part of the game.
With DMA based cheats I disagree as if you were developing a DMA based cheat you would still need to understand how the game works so you can figure out what memory adresses are for what part of the game.
The awnser is a firm no. Cheaters have moved to hardware based cheats with DMA boards. On valorant some cheaters have started exploiting remote play services to use machine vision based aim bots. Neither of those two methods can be detected by a kernel level anti cheat.
Maybe I’m missing something but how could finding out who’s yodeling a movie be rather easy when you would have to decrypt the traffic to determine if it was a movie and not just normal traffic? I get that because of TCP/IP you can tell someone is using I2P but wouldn’t you have to compromise the garlic encryption layer to determine what exactly they are doing?
If they are trying at great leghth to block IPs associated with piracy, it isn’t that much harder to get known VPN IPs blocked too especially when they could use the ‘why won’t someone think of the children’ card and claim VPNs are solely used for CSAM and drug markets.
The smart move would be to skip VPNs and move over to I2P. For those who don’t know I2P is kinda like if tor and torrents had a baby that was a VPN on crack. Unlike a VPN where your traffic is encrypted and sent to one centralized server, I2P encrypts and routes your data through multiple servers and unlike tor every client by default is a node that data can be routed through.
DMA devices are capable of spoofing their hardware IDs to legitimate hardware IDs to get around that.