Looks like he just threw up
Ah, so they don’t actually say that they read kernel space. They check the version of all installed packages and checksum the installed DLLs/SOs.
If the user still has root privileges, this may still not prevent sideloading of kernel modules. Even if it would detect a kernel module that has been sideloaded, I believe it’s possible to write a kernel module that will still be resident after you unload it. This kernel module can then basically do anything without the knowledge of userspace. It could for example easily replace any code running in userspace, and their anticheat would miss that as it doesn’t actually check what code is currently running. Most simply, code could be injected that skips the anticheat.
Of course, in their model, if a user isn’t given root privileges it seems much harder to do anything, then probably the first thing you’d want to look for is a privilege escalation attack to obtain root privileges. This might not be that hard if they for example run Xorg as it isn’t known to be the most secure - there’s a reason there’s a strong recommendation to not run any graphical UI on servers.
Another way if you don’t have root is to simply run the code on a system that does but that does have such a kernel module - or perhaps modify the binary itself to skip the anticheat. I don’t see anything preventing that in their scheme.
I’m having a hard time understanding how this would work. udev will load kernel modules depending on your hardware, and these modules run in kernel space. Is there an assumption that a kernel module can’t cheat? Or do they have a checksum for each possible kernel module that can be loaded?
Also, how do they read the kernel space code? Userspace can’t do this afaik. Do they load a custom kernel module to do this? Who says it can’t just be replaced with a module that returns the “right” checksum?
Right, afghans aren’t arabs
TIL that it’s called a charley horse in English
That joke has aged like milk
Not really, they allowed him to run as he’s a nutjob and thought nobody would vote for him, while retaining an illusion of that all sides are available for election. He’s been described as an Iranian Trump. Then surprised pikachu this reformist nutjob gets elected. This is going to be an interesting run.
Of course it could be taken today. It looks like it’s taken inside a private home. The clothing laws concern public places.
I think if they just filled the alt= attribute with the emoji this would copy fine.
Wow, I have TMJ but didn’t know it’s called that. Basically, the jaw joint clicks when eating certain foods. And I have bruxism and occasional tinnitus. Didn’t know the connection, thanks for clearing it up!
I’ve used LyX with good results, it’s a GUI that abstracts away many of the complexities of latex.
Unless there are security updates to install, then everything will be mercilessly killed
What they say for horses is that if you’re going to walk behind one, stay just behind it. That way if it does decide to kick you, the legs won’t be able to build up momentum and will be mostly vertical before hitting you. Under no circumstance walk 1-2m behind it, you can die if it hits you in the head.
Apply at your own risk to cows.
Looks like real hands but not her hands
Is there a 6502 backend?
Not so sure. What if these 4/5 nukes explode on the launch pad? Even if this is in a remote area you’ll cause some damage to your own country.