Recent testing revealed that Arch Linux, Pop!_OS, and even Nobara Linux, which is maintained by a single developer, all outstripped Windows for the performance crown on Windows-native games. The testing was run at the high-end of quality settings, and Valve's Proton was used to run Windows games on Linux.
Not to mention the major hurdle for Linux gaming is anti cheat software being brought over. Too many games are 100% unplayable because the devs don’t allow their anticheat to be installed on Linux systems
Honestly I can’t say that I miss installing rootkits with terrifying privileges just to play games. I’d rather limit the privileges games have with Flatpak etc., not give them even more.
Sure but gaming is predominantly a social pastime. Meaning that most gamers will make the trade off between installing anticheat and not playing the game their friends are all playing, much like the overwhelming majority of people will trade privacy in favor of being able to send a message to friends on Facebook.
It doesn’t matter how much you value your privacy: most people don’t care and never will. So without the option to give away privacy to play the latest Ubisoft game they won’t be using Linux. Full stop.
Yup. People always latch on to the “Sony (it was actually on Philips, who ran the disc factory that Sony had a stake in, but that’s just nitpicking) installed a rootkit on PCs in the 90s via CDs” and say about how awful that is, and they’re right, then they throw that out the Window and install more advanced rootkits filled with god knows what telemetry when they install games.
Just link them this article about Genshin Impact’s driver-level anti-cheat being used by a ransomware actor to kill anything that would get it the malware’s way.
Yeah, what the heck Valorant. I’m not installing that.
Which anticheat is a “root kit”?
https://www.pcgamer.com/the-controversy-over-riots-vanguard-anti-cheat-software-explained/
All of them.
This is because most anti cheats for windows are kernel level rootkits that have full access to your entire system, and gamers just trust that known to be ineffective, scammy and profiteering, anti cheat companies software companies would /never/ do anything nefarious.
How can you trust them?
You can’t! Black boxed code, babyyyyyy.
Anyway yeah on linux systems basically the designs of all common anti cheat systems would be laughed at as hilariously insecure code that no sane person would allow on their computer because you would have to give it root level access.
This is basically insane as in the linux paradigm, root level access is reserved only for a bare minimum of system processes, whereas on Windows, well with the new Pluton tech in the latest lines of major CPUs, Windows has the ability to DRM literally anything you install on it and just get rid of your ability to run or install it, as they see fit, with a network enabled sub layer of the CPU that you as a user cannot override from within Windows.
The only hurdle for linux gaming is for more gamers and game developers to realize the truth of what I just said.
Its possible to do anti cheat in less invasive ways. But that requires more work from game development studios, and is costly.
Anyone else remember when servers had like actual human admins that would respond to player complaints, and would work on the backend of a server to come up with their own ways to detect cheating server side?
As if the anti-cheat even worked.
Doesn’t matter if it’s a prerequisite
Client-side anti-cheat has always been a scam to offload server processing onto client machines.
This results in worse cheat detection and wastes client resources, but companies like EA can spend less on servers.
In the defence of client side AC; if the entire game runs on the server, then network delay makes FPS:es awful to play. Being able to trust clients and let them do hit detection is quite important in making online FPS:es responsive. In addition, cheats that remove walls/grass, highlight players or even autoaim are near impossible to detect server side. One could try to use heuristics and statistics but it would be difficult to tell the difference between cheaters and players who are just good at aiming and map awareness.
Anti cheat = rootkit. You should not install it at all.
Once more someone who doesn’t understand what the fuck a rootkit is spews their uninformed opinions on lemmy.
Damn man, I know rootkits and your comment is a rootkit!
“Any software that has admin access is a rootkit!” -this entire website
If you compromise your system with software that you don’t know and potentially can introduce a backdoor (even involuntary via bugs), you have a rootkit installed.
If you don’t trust it, don’t install it with admin privileges. Maybe don’t install it at all. Anticheat is a shady business. And mostly not owned by the company that produces the maybe trusted product to be protected.
“A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.”
That’s the Wikipedia definition, in CompTIA Security+ the concept of the malware masking itself is quintessential to the definition of a rootkit. I hear this shit all the time from people on here who think anything that gets elevated privileges is a “rootkit” and hasn’t the slightest idea what the fuck they’re talking about.
“But you don’t know if it could install a backdoor!”
You don’t know if half the shit you install is doing that either, or is Easy Anticheat known for doing this in some official investigation? Did someone find out that Activision is deploying malware in ricochet?
If not, you’re operating on suspicion that you don’t harbor for other software without evidence, based purely on things you’ve probably just barely heard about.
You should notice that I use the word “trust”. I install stuff on my servers and PCs from people who I trust. Why should I trust someone who makes an anticheat engine. Why should I have a reason to do that?
You should also understand that a kernel-level piece of code that can be updated is a very good rootkit. It contains all essential tools to modify hardware, kernel, install drivers, keyloggers etc. It satisfies the definition of “rootkit” very well.
One single piece of code is enough to be a rootkit.
Also definition by antimalware vendors:
https://www.trendmicro.com/vinfo/us/security/definition/rootkit
https://www.kaspersky.com/resource-center/definitions/what-is-rootkit
https://learn.microsoft.com/en-us/sysinternals/downloads/rootkit-revealer#what-is-a-rootkit
Popular definition (e.g . Ionos):