I’m the administrator of kbin.life, a general purpose/tech orientated kbin instance.

  • 0 Posts
  • 320 Comments
Joined 2 years ago
cake
Cake day: June 29th, 2023

help-circle





  • Here is the thing. They cite users running kernel level cheats, and the need to detect them. Well, if they allow user mode anti-cheat to function under linux I see two eventualities that will likely force them to change their mind.

    1: Cheats find a way to spoof running under wine/linux while in windows and continue to use only the user mode cheat while running their windows kernel cheats. 2: They develop kernel mode cheats for Linux and move cheating to Linux.

    Either of these could end up either forcing them to either stop linux clients entirely, or somehow segregate them.

    One thing I’ve seen with serious cheating communities… They will go a long way, a long long way just to cheat. Almost as far as spending time to get good at the game. Almost, but not quite.

    I hope it doesn’t go this way. I don’t play games with kernel anti-cheat as a matter of principle. But it would be annoying if it happened to a game I already played.






  • I think baseline Linux is much less CPU and memory intensive (that is before you start running your own user stuff).

    If I just leave normal apps running in the background I rarely hear my fans spin up on Linux. But on Windows, I can just boot it, login and then randomly the fans spin up and CPU usage in double digits. Why?

    I would agree probably if we ran teams on Linux it would be a resource hog. But you know for work I setup MS SQL server on Linux, and you know even though so far as I can tell they’re doing more work on Linux to run it there, it seems to run faster and take less resources on Linux. That is subjective though, since I cannot tell if the usage level on the Linux SQL is comparable to the windows one. But from my limited uses it’s definitely lower.

    If you start with the OS eating your memory and cycles, there’s less for the bloatware you have on a corporate machine to burn.





  • Linux secure boot was a little weird last I checked. The kernel and modules don’t need to be secure boot signed. Most distros can use shim to pass secure boot and then take over the secure boot process.

    There are dkms kernel modules that are user compiled. These are signed using a machine owner key. So the machine owner could for sure compile their own malicious version and still be in a secure boot context.