@[email protected] to [email protected] • 5 days agoYou can not change my mind.ani.socialimagemessage-square37fedilinkarrow-up1576
arrow-up1576imageYou can not change my mind.ani.social@[email protected] to [email protected] • 5 days agomessage-square37fedilink
minus-square🇰 🌀 🇱 🇦 🇳 🇦 🇰 🇮 linkfedilinkEnglish11•5 days agoWhat is interesting to me is that Steam somehow manages to run elevated commands when installing games and it, itself, never actually gives any UAC warnings and even kinda breaks if you force Steam to run as an admin from the compatibility tab.
minus-squareIllecorslinkfedilinkEnglish4•4 days agoI’d hazard a gueas it’s not touching a system drive, but rather saving all files as a regular user.
minus-square@[email protected]linkfedilink3•3 days agoSteam installs a system level background service to avoid UAC prompts. There was a privilege escalation vulnerability exploiting this service disclosed in 2019.
minus-square@[email protected]linkfedilinkEnglish5•4 days agoUnfortunately, I think the explanation for this one is that Steam bypasses a lot of Windows security and can be used as an exploration vector.
What is interesting to me is that Steam somehow manages to run elevated commands when installing games and it, itself, never actually gives any UAC warnings and even kinda breaks if you force Steam to run as an admin from the compatibility tab.
I’d hazard a gueas it’s not touching a system drive, but rather saving all files as a regular user.
Steam installs a system level background service to avoid UAC prompts. There was a privilege escalation vulnerability exploiting this service disclosed in 2019.
Unfortunately, I think the explanation for this one is that Steam bypasses a lot of Windows security and can be used as an exploration vector.