Valve’s New Transparency Move for Kernel-Level Anti-Cheat on Steam

Valve has announced an important update that addresses a long-standing concern among gamers regarding kernel-level anti-cheat software. This move requires game developers to disclose the use of such software on Steam, fostering greater transparency about what players are installing on their systems.

The Dilemma of Kernel-Level Anti-Cheat

Kernel-mode anti-cheat software has sparked intense debate within the gaming community. While these systems are effective at detecting cheats that operate with high system privileges, they also raise questions about system performance and security. Many players fear that such software could compromise their gaming experience or expose their systems to vulnerabilities. Conversely, there is a strong demand for effective measures to combat cheating, as many players desire a fair gaming environment.

In response to these concerns, Valve has stepped in to provide clarity. “Players have been requesting more transparency around the anti-cheat services used in games, as well as the existence of any additional software that will be installed within the game,” the company stated.

New Disclosure Requirements for Developers

With the new policy, any game that implements client-side, kernel-level anti-cheat software must explicitly indicate this on its Steam store page. Developers of new games will now be required to fill out a specific field detailing the anti-cheat technology employed. Additionally, Valve will review existing titles with kernel-level anti-cheat, reaching out to developers to ensure they update their game listings accordingly.

This initiative aims to eliminate the uncertainty that has surrounded anti-cheat technologies. Many players have expressed frustration over the lack of information regarding intrusive software that could affect their systems.

As Valve noted, “We’ve heard from more and more developers recently that they’re looking for the right way to share anti-cheat information about their game with players.”

Addressing Older Titles and Non-Kernel Anti-Cheat

While the primary focus is on new releases, Valve’s new guidelines will also impact older games with kernel-level anti-cheat systems. Developers will be contacted to ensure their games comply with the updated transparency requirements. However, games utilizing client- or server-based anti-cheat systems that do not operate at the kernel level are not required to disclose this information. Nonetheless, Valve encourages all developers to consider providing such transparency.

Players can already see the impact of this change on the “Counter-Strike 2” Steam page, where the presence of Valve Anti-Cheat software is now explicitly stated.

Positive Community Reception Amid Ongoing Concerns

The update has been largely welcomed by the gaming community, though it has reignited discussions about kernel-level anti-cheat systems. Players remain wary about the implications of allowing such software access to their systems.

Previous implementations of kernel-mode anti-cheat have not been without controversy. For instance, Riot Games’ Vanguard system for “Valorant” faced backlash in 2020 for its persistent kernel access. Similarly, “Doom Eternal” drew criticism for similar reasons, prompting discussions about the delicate balance between maintaining security and ensuring user privacy.

In 2021, Activision introduced its Ricochet kernel-mode anti-cheat for “Call of Duty,” which only functioned while “Warzone” was active. Although this measure attempted to reassure players, concerns about high-level access persisted. EA later adopted a similar approach in 2023, but skepticism about kernel-level anti-cheat remains prevalent.

Weighing the Risks of Kernel-Level Anti-Cheat

While kernel-level anti-cheat systems provide a robust defense against cheating, they come with inherent risks. These systems operate at the same level as critical operating system components, raising potential vulnerabilities if exploited. Past incidents, such as a significant anti-cheat vulnerability in “Dark Souls 3” in 2022 that allowed remote code execution, illustrate the dangers of kernel access. Additionally, “Genshin Impact” faced backlash for its anti-cheat software, which continued to run even after the game was uninstalled, posing risks to users.

Comments are closed.