logoalt Hacker News

CobrastanJorji01/21/20252 repliesview on HN

Sure, and that's why there's more and more "trusted" hardware to try and get computers to a place where their users cannot read and write to or from their own memory.


Replies

AnthonyMouse01/21/2025

Those kinds of things tend to be their own undoing.

You added a security processor to your hardware at ring -2, but hardware vendors are notoriously bad at software so it has an exploit that the device owner can use to get code running at ring -2. Congrats, your ring 0 anti-cheat kernel module has just been defeated by the attacker's code running on your "trusted" hardware.

But in the meantime you've now exposed the normal user who isn't trying to cheat to the possibility of ring -2 malware, which is why all of that nonsense needs to be destroyed with fire.

1515501/21/2025

Good luck ensuring every PCIe device with DMA access is "trusted."

show 1 reply