League Of Legends Cheats Free

0 views
Skip to first unread message

Nikita Desjardins

unread,
Aug 5, 2024, 5:26:19 AM8/5/24
to consretorre
Ive been using a legitimate app called Porofessor that provides a lot of helpful info when playing league of legends, such as displaying objective / jungle camp timers when things will respawn (such as dragon, baron, jungle camps etc), showing player histories like champ statistics, win rates, etc, and also suggests runes and can auto-fill them into your slots to make it easier to prep for a match.

The jungle timers in the app will go off for camps the player doesn't have vision of, for example often times i'll see a camp on the opponents side suddenly show a timer, and will realize that their jg must have just cleared it and is in that location, even though i've got no vision there.


Update - I was wrong; apparently it was showing them when a camp was about to respawn, at 60's , not when it was just killed. So I would be recognizing that the JG should be there soon rather than just cleared it. Coincidence


Based on those quoted sections, this would be considered cheating. You're only supposed to know jungle timers if you see the camp being cleared; seeing a timer after the enemy jungler has cleared a camp outside of your team's vision is not okay. You should report it to the Porofessor developers so they can make changes to the jungle timer overlay.


When games become more and more competitive, when large sums of money can be won in e-sports arenas cheating isn't slow to follow. Riot Games, the company behind League of Legends (LoL) and Valorant hasintroduced an anti-cheat software known as Vanguard. This practice isn't new to the online gaming space, but Vanguard has drawn criticism from gamers and privacy enthusiasts alike. Vanguard runsat the operating system kernel level, which places it between the applications running on your system and the physical hardware. If that wasn't enough to raise an eyebrow, once installed the softwareis always on regardless of if you are playing one of Riot's online games or not. This level of complete system access combined with the acquisition of Riot Games by the Chinese tech giant behind WeChat and QQ,Tencent has raised some alarms. Today we are going to look deeper into how Riot's anti-cheat software works and what the company's relationship with Tencent means for players who are concerned about their privacy and security.


The Vanguard software was first introduced when Riot released the first-person-shooter in June of 2020. The Vanguard software was quick to draw criticism from researchers and more security conscious gamers due to runningat a much deeper level than other applications which may be installed on a user's pc. Vanguard runs at a low system layer known as the kernel. Your operating system kernel is the middle man working between yoursoftware applications and the hardware components which make up your computer. Whatever is running at the kernel level has nearly unrestricted access to anything happening on your device, this is the goal ofmalicious actors trying to write kernel-mode rootkits. Notoriously difficult to remove, kernel-level rootkits can evade anti-virus software by altering the operating system or AV itself. It is worth asking why does league of legendsrequire this kind of access for its anti-cheating software? Is this overkill or a common digital rights management (DRM) practice?


Sony BMG secretly installed DRM-protecting rootkit software on the devices of users and it logged listening information even if users rejected the end-user licensing agreement. Riot is trying desperately to avoid this comparisonand has issued multiple statementson their website and taking as transparent an approach as possible. Vanguard was released closed source in order to prevent cheat developers from having direct access to the source code, but unfortunately this also denies us aglimpse into what exactly we are granting device-wide access.


Vanguard "consists of a client that runs while VALORANT is active, as well as the usage of a kernel mode driver." The Vanguard client launches as soon as your pc is turned on and will continue to run in the backgroundscanning to make sure that it does not detect any known cheats which would grant an unfair in-game advantage while also checking for system vulnerabilities which can be exploited by cheat software. You can disablethe Vanguard client, but you will then not be able to play Valorant or LoL without first restarting your machine.


Vanguard runs in two ways, first it launches a kernel-mode driver as soon as you turn on your pc. This driver scans for known vulnerabilities in other drivers and blocks any which can be used to evade their in-gameanti-cheat client. The anti-cheat client runs while you are playing and checks to see if any known cheats are being used. If the kernel-mode driver does not launch when you boot your machine or if you have disabled itprior to starting a game, Riot's servers will not trust your device and you will not be able to play until you restart your machine and allow both pieces of their anti-cheat software to run asdesigned. Upon booting the Vanguard client will display in your notification tray so you always know when it is running.


By utilizing this low-level anti-cheat software, Riot is able to detect and prevent cheating at the end user's device which runs the illicit software before it reaches their servers. This is an efficient way of combating hacksand cheat programs which give one player an advantage over another, like auto-aiming. This allows it to quite effectively prevent hackers from completely dominating games with unfair tactics and scripts which ensure thatthey can win.


Because the Vanguard anti-cheat runs at the kernel level, it can identify the specific hardware of your device and use this ID to better block your device from accessing their games should you be caught running any cheating software. Itmust be said that the Vanguard anti-cheat system has been extremely successful in cutting down on the amount of cheating within both Valorant and League of Legends, which leads to a more pleasant gaming experience for thoseof us who are not employing game-breaking cheat software.


This defense is less than reassuring. Sure, they are correct with their first point, but the other two are not going to bring any ease to the skeptical minded gamer. It doesn't matter if other companies aredeploying kernel-level software without disclosing their code, the practice itself should raise concern and we should not idly accept this as the new normal.


Their third point is particularly concerning and warrants wider discussion. There is a huge difference in the privilege between user-mode and kernel-mode. Sure both modes can access the unencrypted files andpictures on your hard drive, but kernel access gives a degree of control of the entire device, hardware and software included, that user-mode does not.


Riot is not the only company employing kernel level anti-cheating software. There are other players in the anti-cheat space and two other popular software packages that run at the kernel level are Easy Anti-Cheat andBattlEye. Similar to Vanguard, these programs run at the lowest layer on players' machines, but there is a major difference between the operating times of these alternatives. Unlike Riot's solution to cheating, Epic's Easy Anti-Cheatand BattlEye only run while the player is playing and do not require this "always-on" status. Not only does this leave players feeling less "watched" by the creepy possibility of persistent kernel access, but it alsoprovides a degree of protection. Should Vanguard be compromised, all machines using it which are powered on have the potential to be hit by exploits simply because the software is always running. Players using the solution fromEpic, may find themselves not exposed to attack if their software is not running while they do other things on their machines.


Users on various gaming forums scattered throughout the web reported concerns that this software might slowdown their PC or cause issues with their hardware. Currently, any reports or claims that errors or issuesarising are anecdotal and Riot has not confirmed any compatibility issues. Riot is also releasing regular patches to make sure that there are little to no errors for users running their anti-cheat. If you encountering any issueswith your device or games after installing Vanguard, make sure that you contact the Vanguard support team.


Sure, Valorant and LoL's usage of Vanguard software has led to a decrease in cheating, but does this mean that we should accept that kernel level, always on, AI powered anti-cheat scanning should become the defaultsolution for companies looking to crack down on malicious actors? Should we be worried that the success of the Vanguard software will inspire developers from around the world to demand kernel level access for theirsoftware?


Beyond these concerns it is important to look at the company itself. Should we trust Riot? They have often been the butt of jokes about code quality and their security practices have come into question as well following breachevents that saw the leak of League of Legends sourcecode. Riot themselves issued a warning regarding a rise in new cheats being usedin their games following this incident. This track record doesn't inspire a great deal of confidence and players are right to be concerned about allowing the LoL anti-cheat software free reign on their machines.


The Chinese tech giant Tencent took full ownership of Riot Games in 2011. This ownership role ads an interesting level of concern when evaluating if you want to run kernel level software on your devices withoutbeing able to review the code for yourself. Hear me out, I don't want to go full tin-foil hat, but this is granting complete device access to the company behind WeChat, QQ, which plays an active role in the operationof the social credit scores in mainland China. Concerned players have raised fears that should a zero-day vulnerability be found and not disclosed to Riot through their bug bounty program,it could pose a major threat to those running their software. Theoretically this could allow a malicious actor with a zero-day the possibility of bricking devices which have Vanguard installed. It is worth considering the risks ofallowing software which could fall into the hands of an authoritarian government to have near complete access to your device and data.

3a8082e126
Reply all
Reply to author
Forward
0 new messages