alphacyberranger@sh.itjust.works to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 day agoDenuvo Games Cracked in last 30 Days (Hypervisor Bypass)sh.itjust.worksimagemessage-square45fedilinkarrow-up1192arrow-down14
arrow-up1188arrow-down1imageDenuvo Games Cracked in last 30 Days (Hypervisor Bypass)sh.itjust.worksalphacyberranger@sh.itjust.works to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 day agomessage-square45fedilink
minus-squares08nlql9@sopuli.xyzlinkfedilinkEnglisharrow-up10arrow-down4·1 day agoswitch to Linux or dual boot?
minus-squareDavel23@fedia.iolinkfedilinkarrow-up26·24 hours agoHypervisor bypass doesn’t work on Linux. Gotta be on Windows if you want to use it.
minus-squaregrill@thelemmy.clublinkfedilinkEnglisharrow-up2·18 hours agoIs this actually true? I didn’t hear anyone talking about this until now.
minus-squarefar_university1990@reddthat.comlinkfedilinkEnglisharrow-up7·16 hours agoWine is user space, hypervisor is at least kernel level. Cannot install windows hypervisor in wine.
minus-squareLiketearsinrain@lemmy.mllinkfedilinkEnglisharrow-up1arrow-down1·12 hours agoYou could develop one quite simply (i.e. via KVM APIs), but you would sooner run into issues due to the type of verification mechanisms Denuvo uses on legitimate copies
minus-squarekkj@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up2·24 hours agoHow effectively does that work? Can you spoof the Ring -1 permissions? Maybe I should set up single-GPU passthrough.
minus-squares08nlql9@sopuli.xyzlinkfedilinkEnglisharrow-up4·23 hours agoI dont know what i was suggesting. Bypass (as others have said) only works in W
switch to Linux or dual boot?
Hypervisor bypass doesn’t work on Linux. Gotta be on Windows if you want to use it.
Is this actually true? I didn’t hear anyone talking about this until now.
yup. Does not work on Linux.
Wine is user space, hypervisor is at least kernel level. Cannot install windows hypervisor in wine.
You could develop one quite simply (i.e. via KVM APIs), but you would sooner run into issues due to the type of verification mechanisms Denuvo uses on legitimate copies
How effectively does that work? Can you spoof the Ring -1 permissions? Maybe I should set up single-GPU passthrough.
I dont know what i was suggesting. Bypass (as others have said) only works in W