favicon

T4K3.news

Cheaters Emerge in Battlefield 6 Open Beta

Cheating footage appears on day one of the PC beta despite Secure Boot and TPM 2.0 protections.

August 8, 2025 at 03:21 PM
blur Cheaters Already Spotted in Battlefield 6 Open Beta, Despite Secure Boot Requirement

PC Open Beta sees cheating footage on day one even as Secure Boot and TPM 2.0 protections are in place.

Cheaters Emerge in Battlefield 6 Open Beta Despite Secure Boot

Battlefield 6’s PC Open Beta has drawn cheating claims on day one, even though access requires enabling Secure Boot and running EA’s Javelin anti cheat. EA published a guide on August 7 explaining how Secure Boot checks for trusted software before the game starts, noting it may involve tweaking BIOS settings. A widely shared clip showing a cheater in action has racked up millions of views on social media, underscoring how open beta testing can become a stage for rapid reactions and ongoing scrutiny.

DICE producer Alexia Christofi acknowledged the issue and said the player shown in the clip has been banned. The beta has attracted more than 300,000 concurrent players on Steam, prompting the team to plan a substantial increase in server capacity ahead of the October launch. Separately, Activision outlined that TPM 2.0 and Secure Boot will be required to play Call of Duty Black Ops 7 on PC, signaling a broader shift toward hardware level protections in major shooter franchises.

Key Takeaways

✔️
Secure Boot and TPM 2.0 are becoming standard baselines for PC play
✔️
Open beta traffic stresses existing server capacity
✔️
Cheating during Day 1 beta tests tests the effectiveness of anti-cheat systems
✔️
Hardware-based protections raise accessibility questions for some players
✔️
Publishers link beta experiences to broader security strategies
✔️
Public reaction can shape how quickly new safeguards are rolled out

"The team was aware of the issue and the player identified as cheating in the clip above was already banned."

DICE response to cheating clip

"These hardware-level protections are a key part of our anti-cheat efforts, and we’re asking all players to get compliant now."

Activision blog post on TPM 2.0 and Secure Boot

"Cheats on day one remind us that security is a moving target"

Editorial remark

"Hardware checks raise the bar even as cheats adapt"

Early reaction

The episode highlights a broader shift toward stronger hardware-based defenses, even as cheaters adapt to work around them. Requiring TPM 2.0 and Secure Boot could raise barriers for players with older hardware, raising questions about fairness and access. Still, publishers argue these measures help level the playing field by making certain exploits harder to execute. The key tension is speed versus security: studios must push updates fast enough to deter cheats without locking out legitimate players.

As launch approaches, the industry may see a race to balance enforcement with player experience. The battlefield is moving from simple in-game rules to system-level protections, and public reaction will influence how aggressively developers deploy new safeguards. This is not just about this beta; it is about the future of fair play in competitive PC gaming.

Highlights

  • Day one cheats test the launch day nerves
  • Hardware checks raise the bar even as cheats adapt
  • Secure Boot isn't a shield yet
  • Cheating footage shows the gap between protection and practice

Cheating and security measures spark public reaction

The open beta shows that even strong hardware based protections may not stop cheating, potentially shaping launch perception and inviting scrutiny of access barriers tied to Secure Boot and TPM requirements.

The industry will watch closely how fast cheats are deterred as launch approaches.

Enjoyed this? Let your friends know!

Related News