The updated rootkit will be uploaded and installed to your computer kernel automatically upon closure of the deal.
I posted this to /c/news where it was promptly removed of course
For good reasons of course
The updated rootkit will be uploaded and installed to your computer kernel automatically upon closure of the deal.
For good reasons of course
It’s not hard to see why the post was deleted on the other comm, the mods there take editorializing very seriously, you especially crossed that line with the FUD headline and post.
This isn’t in defense of EA, and I’m aware of their anti-cheats and many like it having kernel-level access, but how do you know this? Where is this coming from? How will it be magically installed once the deal is closed? When will it be installed? Who’s to say it hasn’t been “installed” already, years long before any of this deal thing came up? Would you have come up with that conclusion if Saudi Arabia’s PIF wasn’t part of the deal/mentioned in the article? Does this apply to every single EA game from their catalogue (IIRC some games aren’t locked-in to the Origin client)?
If these questions are difficult to answer, then there’s your problem.
Assuming default settings, the EA App runs a background service with elevated privileges (often as TrustedInstaller on Windows), and automatic updates are enabled by default. That means:
So, once the acquisition closes, any architectural changes to anti-cheat or telemetry mechanisms can be deployed silently as part of routine patching cycles. This does not require a new game release or user intervention.
This is a fair assumption under standard security threat modeling practices.
Security best practices assume that any installed kernel-level driver is capable of full system access, including:
So yes, if you’ve installed a modern EA game, the capability is already there. The only real change under a new ownership model is intent.
The kernel-level threat model doesn’t change based on ownership, the capabilities remain the same. But the motivations and likely use cases absolutely do.
It is a factual and well-documented reality that Saudi Arabia is:
In that context, PIF’s ownership of a widely installed, privileged software platform, with millions of endpoints and baked-in telemetry infrastructure, is not just theoretical risk, it’s an active national security concern.
It’s reasonable to assume that whatever institutional restraint EA may have had about using anti-cheat for more than gameplay integrity may now be loosened, or removed entirely.
EA claims that kernel-level anti-cheat is used “selectively”, primarily in high-profile online multiplayer titles. However:
So while it’s technically true that not all EA games use kernel anti-cheat, the lack of disclosure and difficulty in verifying makes it functionally impossible for the average user to know which games are safe, especially given the bundled update system that can install new software silently at any time.
Games purchased outside the EA App (e.g., on Steam or Epic) often still require the EA launcher to run, meaning kernel drivers can still be deployed through those channels.
Personally, I would’ve preferred you responded with xenophobic slurs targeted at Arabs like me than with whatever LLM answer this is supposed to be, but you do you I guess. I would’ve almost taken you seriously… almost.
So here, let me throw a random ass quote at you:
AI slop
If you’re not going to address the contents then I’m putting you on my blocklist
Where is the slop? That usually implies inaccurate information and/or sloppy sentences or word structure.
really ? the post doesn’t strike me as AI tbh