Call of Duty fans on PC are encountering a new era in gaming system requirements as Activision, following in the footsteps of Electronic Arts and its launch of Battlefield 6, has announced the mandatory enablement of Secure Boot and TPM 2.0 for Windows 11 and Windows 10 players. In a move that underscores the rapidly escalating fight against cheating in competitive multiplayer titles, these hardware-based security protocols are now integral prerequisites for the latest iterations of one of the world’s most popular first-person shooters. With the rollout of these requirements in Call of Duty’s Ricochet Anti-Cheat engine and the upcoming release of Call of Duty: Black Ops 7, the PC gaming landscape is being reshaped by security-centric decisions that are sure to influence user experience, hardware upgrade cycles, and the broader discourse around anti-cheat technologies.
For years, competitive multiplayer games have wrestled with cheaters looking to gain unfair advantages. Titles in the Call of Duty series, known for their immense popularity and thriving esports scenes, have been particularly affected. Cheating not only frustrates legitimate players but also undermines the integrity of online play, reducing player engagement and threatening the long-term success of franchises.
Traditionally, anti-cheat measures ranged from software-based solutions to account ban systems. However, as attackers have become more sophisticated—developing kernel-level exploits and rootkit-style hacks—developers are increasingly turning to hardware-backed security features that offer a new layer of protection.
EA explicitly stated, “To play on PC, you must have Secure Boot turned on,” reinforcing that its anti-cheat stack wouldn’t function—or permit access—without these features active.
As publishers like Activision and EA continue to refine and expand these systems, ongoing community feedback, transparent communication, and robust technical support will be essential to maintaining goodwill within a diverse and passionate PC gaming community.
Whether these measures become a standard feature in all high-profile multiplayer games or spark a more nuanced debate about user control and hardware sovereignty, one fact is beyond dispute: PC gaming, already defined by its flexibility and innovation, is undergoing one of its most significant shifts in a generation—with profound implications for every stakeholder in the ecosystem.
Source: Neowin After Battlefield 6, Call of Duty makes Secure Boot, TPM mandatory on Windows 11/10
Background: The Battle Against Cheating in Modern Gaming
For years, competitive multiplayer games have wrestled with cheaters looking to gain unfair advantages. Titles in the Call of Duty series, known for their immense popularity and thriving esports scenes, have been particularly affected. Cheating not only frustrates legitimate players but also undermines the integrity of online play, reducing player engagement and threatening the long-term success of franchises.Traditionally, anti-cheat measures ranged from software-based solutions to account ban systems. However, as attackers have become more sophisticated—developing kernel-level exploits and rootkit-style hacks—developers are increasingly turning to hardware-backed security features that offer a new layer of protection.
What Are Secure Boot and TPM 2.0?
Secure Boot
Secure Boot is a feature built into most modern UEFI firmware that verifies the integrity of the operating system and any boot software before allowing them to execute. By ensuring that only trusted, signed code can run during the boot process, Secure Boot thwarts many rootkit and bootkit attacks—types of malware that can alter the Windows startup process or operate below the level of the OS.TPM 2.0
A Trusted Platform Module (TPM) 2.0 is a specialized hardware component, typically a chip on the motherboard, that securely stores cryptographic keys and performs security functions. Microsoft made TPM 2.0 mandatory for Windows 11, but its adoption had been less stringent in the context of specific applications or games—until now. TPM 2.0 helps validate the boot process, ensuring the PC has not been tampered with and providing robust attestation to remote servers.Why Are These Features Becoming Mandatory in PC Gaming?
The Move to Hardware-Based Security
Upcoming releases in both Battlefield and Call of Duty franchises mark a turning point for PC gaming security. The adoption of Secure Boot and TPM 2.0 isn’t just about keeping pace with modern hardware standards; it reflects a proactive effort to erect new barriers for would-be cheaters. By leveraging hardware-backed cryptographic checks at startup, developers are raising the level of sophistication required for hacks to succeed.Ricochet Anti-Cheat: Raising the Stakes
The Season 05 update for Call of Duty significantly expands the reach of the Ricochet Anti-Cheat engine. Activision’s technical briefings explain that, with Secure Boot and TPM 2.0 enabled, each PC generates a security attestation at startup. This data is transmitted to Call of Duty servers before online play begins, helping detect any modifications or tampering that might otherwise evade traditional software-only checks.- This sequence works as follows:
- Startup: Secure Boot and TPM 2.0 verify integrity during system boot.
- Connection: The game sends verification results to Activision servers.
- Verification: The servers perform their own check to confirm the client’s legitimacy.
How Battlefield 6 Set the Precedent
Electronic Arts, with the highly anticipated Battlefield 6, was first to place these requirements in the gaming spotlight. EA’s insistence on Secure Boot and TPM 2.0 for the launch of its powerful new Javelin anti-cheat system was met with mixed reactions. While some cheered the heightened security, others lamented the need to change BIOS settings, potentially upgrade hardware, or troubleshoot compatibility issues previously unfamiliar to many gamers.EA explicitly stated, “To play on PC, you must have Secure Boot turned on,” reinforcing that its anti-cheat stack wouldn’t function—or permit access—without these features active.
How Secure Boot and TPM 2.0 Disrupt Cheating
Trust at Every Step
By requiring Secure Boot and TPM 2.0, developers can enforce a trusted computing baseline before any game code executes. Cheaters who attempt to alter privileged system files or operate below the OS level now face significant new obstacles:- Rootkit and Bootkit Elimination: Hackers who leverage pre-OS malware are blocked, as these attacks become non-trivial once Secure Boot is correctly enabled.
- Remote Attestation: With TPM 2.0, the PC can cryptographically prove to the server that the BIOS, bootloader, and system files are original and unmodified.
- Reduced Spoofing: Since hardware and firmware are integrated into the verification process, software-only spoofing or virtualization tricks are rendered largely ineffective.
Blizzard’s Assurance on Performance
Recognizing concerns about the impact on game performance, Blizzard/Activision have addressed the issue preemptively. The companies maintain that these checks run exclusively during system and game startup. Once players enter the match, the anti-cheat engine’s kernel and user-level activity remains dormant unless anomalous activity is detected, minimizing any risk of gameplay stutter or latency.Implications for Players
New Barriers to Entry
These requirements introduce a few notable hurdles for PC gamers:- BIOS Configuration: Players must ensure Secure Boot is enabled, often necessitating navigation through UEFI menus—a process unfamiliar to less-technical users.
- Hardware Compatibility: PCs lacking a compliant TPM 2.0 chip (common in older hardware or certain DIY builds) may no longer be able to run new Battlefield or Call of Duty titles unless upgraded.
- Potential for Errors: Misconfiguration can result in failed boot sequences, or even lock users out of both the game and their operating system until BIOS settings are corrected.
Guides and Documentation
To mitigate these issues, both EA and Activision have published detailed guides to help users enable Secure Boot and TPM 2.0. These resources provide step-by-step instructions, screenshots, and troubleshooting tips. For many, however, this marks the first journey into motherboard firmware settings, increasing the pressure on technical support channels and PC repair services.Impact on Competitive Integrity
The wider application of hardware-based security may prove a decisive blow against sophisticated cheating methodologies. By establishing a minimum security standard, developers can more confidently ban accounts and enforce fair play. This effort could revitalize trust in ranked matches, tournaments, and the broader competitive scene.Community Response: Relief and Resistance
Positive Reception
Among esports professionals and competitive players, the enforcement of Secure Boot and TPM 2.0 has been largely welcomed. Many see the move as overdue, applauding efforts to combat cheaters through mechanisms that are fundamentally more difficult to bypass. Tournament organizers, in particular, are optimistic that such anti-cheat systems can provide a more level playing field and reduce the frequency of match-altering exploits.Friction and Backlash
Conversely, segments of the PC gaming community have expressed concern:- Privacy Fears: Some remain wary of increased hardware attestation, fearing it could be expanded into deeper surveillance.
- Accessibility Issues: Players with older machines or non-standard PC builds may be locked out, raising questions about the exclusionary effects on the player base.
- Technical Headaches: A non-trivial portion of gamers are reporting boot issues, confusion around UEFI/BIOS menus, or incompatibilities with dual-boot systems and legacy operating systems.
Broader Industry Impact
Shifting Standards for PC Gaming
The adoption of Secure Boot and TPM 2.0 by two major AAA franchises will likely be a bellwether for the industry. With both Activision and EA making cryptographic platform verification a baseline for multiplayer participation, smaller studios and indie developers may face mounting pressure to integrate similar checks into their anti-cheat toolkits, or risk being perceived as soft targets by cheaters.Impacts Beyond Cheating
These requirements expand the influence of platform-level security in consumer software more broadly:- Encouraging Hardware Upgrades: Gamers who wish to participate may be driven to purchase newer motherboards, CPUs, or even pre-built PCs with compliant firmware.
- Operating System Trends: As Windows 10 nears end-of-life and Windows 11 (with its mandatory TPM 2.0) becomes more ubiquitous, games that rely on legacy OSes will dwindle in number.
- Potential Lessons for Other Software: If hardware-backed security proves effective in gaming, similar models could be adopted for other high-value services, including digital content streaming, online banking, and remote work applications.
Navigating the Transition: Practical Tips
How to Check and Enable Secure Boot and TPM 2.0
- Access Your BIOS/UEFI: Restart your PC, pressing the designated key (often F2, Delete, or Esc) during boot.
- Find Secure Boot Settings: Look for a section labeled "Boot" or "Security." Ensure Secure Boot is set to "Enabled."
- Locate TPM Settings: Sometimes listed as "TPM," "PTT" (Platform Trust Technology on Intel boards), "fTPM" (on AMD), or “Security Chip.” Enable it if possible.
- Save and Restart: Save changes, exit your BIOS/UEFI, and boot into Windows. Use Windows’ built-in TPM management tool (
tpm.msc
) and System Information viewer (msinfo32
) to confirm everything is active. - Update Firmware If Needed: Older machines may require BIOS updates to expose these options.
Troubleshooting Common Pitfalls
- Error Messages at Boot: Double-check compatibility settings, especially if you dual-boot with Linux or use legacy hardware modes.
- TPM Module Missing: Check your motherboard manual—some boards need a physical TPM module (available as an add-in).
- Secure Boot Greyed Out: This can happen if your boot drive uses an outdated partition format (MBR instead of GPT). Backup your data and consider converting to GPT if necessary.
Security Versus Accessibility: Ongoing Challenges
While the adoption of Secure Boot and TPM 2.0 marks a watershed for anti-cheat infrastructure, it raises critical questions about the future direction of PC gaming. Developers are betting that the benefits to fairness and player trust outweigh the growing pains felt during the transition. However, for some users—particularly those with older hardware or highly customized setups—these changes will mean difficult choices, upgrading components, or potentially missing out on major new titles.As publishers like Activision and EA continue to refine and expand these systems, ongoing community feedback, transparent communication, and robust technical support will be essential to maintaining goodwill within a diverse and passionate PC gaming community.
The Road Ahead: What Comes Next?
As the 2024/2025 multiplayer shooter season unfolds, it is virtually certain that the move toward platform-anchored security will accelerate. With cheaters deploying increasingly sophisticated tools, the arms race in gaming security is unlikely to slow down soon. The lessons learned from the rollout of Secure Boot and TPM 2.0—both technical and social—will shape the way developers, hardware vendors, and players approach the intersection of performance, accessibility, and trust for years to come.Whether these measures become a standard feature in all high-profile multiplayer games or spark a more nuanced debate about user control and hardware sovereignty, one fact is beyond dispute: PC gaming, already defined by its flexibility and innovation, is undergoing one of its most significant shifts in a generation—with profound implications for every stakeholder in the ecosystem.
Source: Neowin After Battlefield 6, Call of Duty makes Secure Boot, TPM mandatory on Windows 11/10