Technical

What Is TPM 2.0 and How Does It Affect Cheating?

TPM 2.0 (Trusted Platform Module 2.0) is a tamper-resistant cryptoprocessor that ships in every modern PC — discrete chip, firmware-TPM (fTPM/PTT), or integrated into the CPU as Microsoft Pluton. It stores cryptographic keys, signs attestation quotes, measures boot state via PCRs, and exposes a hardware-rooted device identity via the Endorsement Key (EK). Anti-cheats use the EK as a non-spoofable HWID and validate boot state via attestation. The EK cert is NOT spoofable in software.

RawCheats Anti-Cheat Research Team — Anti-Cheat Research TeamUpdated May 12, 2026

TPM 2.0 is the single most important security primitive for the future of consumer anti-cheat. It is also the most widely misunderstood. The vast majority of "TPM spoof" content circulating in the wild rotates derived material — primary keys, surface hashes — but does not and cannot rotate the underlying Endorsement Key Certificate, which is the actual non-spoofable identifier anti-cheats care about.

What''s in the TPM

A TPM 2.0 chip contains: (1) an Endorsement Key (EK) — a keypair burned in at manufacture, public key certified by the TPM vendor CA; (2) Platform Configuration Registers (PCRs) that store hash chains of boot-time measurements (UEFI, bootloader, kernel, drivers); (3) a hierarchy of derived keys (primary, owner, endorsement) that can be created, cleared, and recreated by software using TPM2_Clear and TPM2_CreatePrimary commands; (4) sealed-storage capability where data can only be unsealed if PCRs match a specified configuration. TPMs come in three flavors: discrete (separate chip on the motherboard), firmware (fTPM on AMD, PTT on Intel — runs in CPU TEE), and Pluton (integrated into CPU silicon, currently on AMD Ryzen 7000+ and Intel Core Ultra).

What anti-cheats use the TPM for

For Vanguard, EAC (in heavy-protection titles like Fortnite), BattlEye, and increasingly other ACs: (1) Reading the EK certificate hash as a HWID component — when you get HWID-banned, the EK hash is on the banlist; (2) Validating boot state via PCR-based attestation — Secure Boot enabled, no test-signing, no unsigned drivers loaded before the AC driver; (3) Sealing per-account or per-session data such that key material cannot be exfiltrated and replayed on a different machine; (4) Participating in Microsoft Remote Attestation flows (COD Black Ops 7 model).

What is and isn''t spoofable

Spoofable in software: primary keys derived from the EK can be cleared via TPM2_Clear and regenerated, which rotates the hash material an AC sees if it''s hashing a primary-key-derived value. The Linux-method "TPM hash spoof" pattern that surfaced in late 2025 exploits this. SMBIOS values feeding into HWID can be rotated. UEFI/BIOS strings can be rotated.

NOT spoofable in software: the EK certificate itself, signed by the TPM vendor''s CA, with the EK private key physically locked inside tamper-resistant silicon. Pluton''s integrated EK is even harder to attack physically since there''s no separate chip to probe. Attestation flows that validate the full EK certificate chain against vendor CAs cannot be fooled by software.

The Fortnite Feb 19, 2026 TPM mandate

On Feb 19, 2026 Fortnite shipped a mandatory TPM 2.0 + Secure Boot + IOMMU requirement for all matches. Players without TPM 2.0 enabled in BIOS were locked out. This was the largest mainstream-game adoption of TPM-gated play to date. The Riot 2025 HWID ban totals (2.3M+ for the year, 340K in 5 days in Jan 2026) plus Fortnite''s adoption are the proof that TPM is the new HWID anchor — and it''s why the HWID Spoofer Complete 2026 Guide treats TPM-aware spoofing as a top-tier feature.

Practical impact on cheating

On a clean machine with a fresh TPM hierarchy (TPM cleared, primary keys regenerated, account not previously banned with this EK cert), you have a fresh fingerprint. On a previously-banned EK cert, you have the same EK forever — and any AC checking EK directly will tag it. This is the central reason "format and reinstall" doesn''t fix a true HWID ban: format doesn''t touch the TPM, and most consumer users never know to clear it. See Will a new motherboard fix my HWID ban for the hardware-replacement angle.

Forward look — Pluton

Microsoft Pluton replaces discrete and firmware TPMs with a TPM inside the CPU silicon, signed by Microsoft''s root CA, with firmware updates delivered via Windows Update. When Pluton-only mandates start arriving (almost certainly 2027+), the entire "swap TPM module" hardware workaround stops working — you''d have to swap the CPU. RawCheats'' position remains: external-mode cheats with proper account isolation, hardware decorrelation, and HWID hygiene, with a clear-eyed recognition that the AAA AC trajectory is toward hardware-rooted attestation. Run Raw Spoofer before sessions; treat your cheating account as disposable; don''t use TPM-cleared "spoofs" on accounts that will pass full attestation.

TPM-bus sniffing — the physical attack surface

For discrete TPMs (separate chips connected via LPC or SPI bus), the chip-to-CPU communication runs over a physical bus that can be sniffed with logic analyzer equipment. Published research (the "TPM-Fail" line of work, plus various Chinese-origin TPM-bus-sniffing demonstrations) has shown that discrete TPM secrets can sometimes be extracted via physical bus probing, particularly during the BitLocker key-unsealing flow at boot. This is a hardware-level attack requiring physical access, expertise, and time — it''s not a software-level threat to anti-cheat HWID enforcement.

Firmware TPMs (fTPM/PTT) and Pluton don''t have an external bus to probe, eliminating this attack surface entirely. The trajectory toward fTPM and Pluton baseline isn''t accidental — it''s partly motivated by closing the physical-attack surface on the security primitives Windows depends on.

What the late-2025 "Linux TPM spoof" actually rotated

The Linux-method "TPM spoof" pattern that surfaced in late 2025 (and that''s been documented circulating in cheat-community channels through Q1 2026) uses tpm2-tools on a Linux live USB to clear the TPM hierarchy and recreate primary keys. The effect: any AC hashing values derived from TPM primary keys sees different output before and after the procedure — which is the "spoof" effect users describe. The effect that doesn''t happen: the underlying EK certificate, signed by the TPM vendor''s CA, remains unchanged. An AC that validates the full EK cert chain (Vanguard increasingly does, attestation-aware ACs always do) sees the same EK before and after the procedure. The technique works against a window of ACs that don''t fully attest the EK; it doesn''t work against ACs that do. The window is closing.

Sources

  1. TPM 2.0 Library ArchitectureTrusted Computing Group
  2. Trusted Platform Module OverviewMicrosoft Learn
  3. Securing Fortnite with Secure Boot and TPM 2.0Epic Games
  4. TPM-Fail AnalysisUniversity of Birmingham

Related Questions

Can a HWID Spoofer Beat TPM 2.0?

No. TPM 2.0 endorsement keys are signed by the TPM chip manufacturer at production and stored inside the chip itself — they cannot be rewritten from software. Anti-cheats that read TPM EK and PCR values (Vanguard, COD: Black Ops 7 via Remote Attestation, FACEIT, Fortnite tournaments) get a cryptographic identity no commercial spoofer can fake. The only public TPM-spoof attempt — Samuel Tulach's tpm-spoofer POC — is unstable research code.

What Is Microsoft Pluton?

Microsoft Pluton is a TPM 2.0 implementation integrated directly into the CPU silicon as a security subsystem. Unlike discrete TPMs (separate chips on the motherboard) or firmware TPMs (fTPM/PTT running in CPU TEE), Pluton is physically integrated into the processor die and signed by Microsoft's root CA. It ships in AMD Ryzen 7000+ series, select Intel Core Ultra parts, and Qualcomm Snapdragon X. Pluton is NOT spoofable in software and has no separate chip to physically replace.

What Is Microsoft Remote Attestation?

Microsoft Remote Attestation is a Windows platform feature that lets a remote server cryptographically verify a client device''s identity, boot state, and configuration using the TPM 2.0 endorsement key (EK) certificate plus signed boot-log measurements. The TPM signs an attestation quote with a hardware-protected key, the server validates it against the TPM vendor''s CA, and the result is a non-spoofable answer to "is this machine in a trusted state?" Adopted by Call of Duty Black Ops 7 and increasingly by AAA anti-cheats in 2026.

What Is Secure Boot and Why Do Anti-Cheats Require It?

Secure Boot is a UEFI firmware feature that cryptographically verifies the OS bootloader and kernel against a database of signed signatures. Only Microsoft-signed (or vendor-signed) boot code can execute. Anti-cheats require it because Secure Boot prevents loading rootkit-level cheats that hook the boot chain itself. With Secure Boot off, an attacker can patch the Windows bootloader, load unsigned drivers, and operate below the anti-cheat's visibility. Fortnite mandated Secure Boot on Feb 19, 2026; Vanguard requires it on Windows 11.

Raw Fortnite
Live purchase·5m ago
dezz from US bought Raw Fortnite