If an anti-cheat update can turn a PCIe device into “a $6k paperweight,” who really controls the gaming PC?
That is the uncomfortable question raised by Riot Games’ Vanguard update, which reportedly detects DMA cards used for Valorant cheats and triggers an IOMMU restart that cuts off the device’s access, according to Notebookcheck. Riot is right to fight cheaters. But remotely blocking hardware access, with a reported full OS reinstall as the recovery path, crosses from anti-cheat enforcement into PC control.
When does stopping a cheat become controlling the machine?
The obvious defense is simple: Direct Memory Access hardware is not an innocent tool in this context. DMA cards plug into a motherboard’s PCIe slot and can read or write game memory from outside the normal game process. That makes them attractive to cheat makers because they can bypass many software-level checks.
Riot’s problem is real. Vanguard exists because competitive games break when players can buy hardware that peeks around the rules. In Riot’s own security writing, the company says cheats can load early, gain higher privilege, and hide before the operating system can defend itself. Riot also says security features such as Secure Boot, VBS, and IOMMU matter because they help guard that early boot chain.
“If your system is affected, Vanguard will prompt you with our VAN:Restriction service to update your motherboard’s firmware,” Riot wrote in its official post on closing a pre-boot security gap.
That official Riot post is about stricter boot-security checks and motherboard firmware. Notebookcheck’s report is about a separate Vanguard action against DMA cards. The two should not be blurred. But together they show the same direction of travel: anti-cheat is moving deeper into the PC stack.
That is the line worth arguing over.
Why did DMA cheats drag Vanguard into the hardware layer?
Because software-only enforcement struggles when the cheating device sits outside the usual software path.
Notebookcheck describes DMA cards as hard to detect and relatively expensive. Riot’s own post frames hardware-assisted cheating as one of the most effective and costly forms of cheating. The logic is brutal: cheat developers move closer to hardware, so anti-cheat vendors follow them there.
That does not make every response acceptable.
Most players did not sign up for an escalating security war inside their PCs. They signed up for fair matches. Those are not the same bargain. A player may accept a kernel-level anti-cheat because ranked integrity matters. That does not mean the same player has consented to a game company flagging hardware in a way that requires rebuilding the operating system to recover access.
This is where Riot’s posture matters. The company’s X post, as described by Notebookcheck, showed what appeared to be a pile of DMA FPGAs and called it “a $6k paperweight.” That may land as a dunk on cheaters. It also broadcasts a dangerous confidence: hardware attached to your PC can become collateral in Riot’s enforcement model.
For adjacent MLXIO coverage on the tension between software authority and device control, see our reporting on Apple’s hardware shakeup and faster innovation and Microsoft Defender zero-days. The Riot case is narrower, but the ownership question is familiar.
Why does the reported OS reinstall change the stakes?
Because a full reinstall is not a timeout. It is a system-level consequence.
Notebookcheck reports that Vanguard can detect DMA cards, trigger an Input-Output Memory Management Unit restart, and force Windows to cut off the DMA device’s access by flagging it as unsafe. The report says the only way to access it again is a full OS reinstall.
If accurate, that is not merely “you cannot launch Valorant.” That is “your hardware state has been altered enough that recovery means rebuilding Windows.” Even if the target is a cheat device, the enforcement mechanism reaches beyond the match, beyond the Riot client, and beyond the normal penalty box of bans or game restrictions.
The burden is obvious:
- Downtime: Reinstalling an OS is not a quick error-code fix for many users.
- Configuration loss: PC builders and power users often run custom setups that take time to rebuild.
- Data risk: Any reinstall raises the chance of lost files if backups are incomplete.
- False-positive danger: Vanguard has previously drawn criticism for malfunctioning, and Riot has had to address claims around hardware issues in the past.
Riot has said in a prior Reddit update that it had not confirmed instances of Vanguard bricking hardware at that point. It also said fewer than 0.03% of players had reported Vanguard issues after 14.9 went live, with most cases involving common error codes. That context matters. Riot is not admitting a wave of destroyed PCs.
But the standard should be higher than “not many people complained.” When enforcement touches hardware access, the process must be reversible, documented, and proportionate.
What did players actually consent to when they accepted Vanguard?
They consented to a trade: tolerate invasive anti-cheat in exchange for cleaner games.
That trade has limits.
Consent weakens when an update silently expands what the software can flag, block, or render useless for its intended purpose. Players can uninstall a game. They can avoid ranked. They can reject a launcher. But once enforcement reaches hardware behavior and OS recovery, the user’s practical control narrows.
Accountability is the missing layer. A player whose device is blocked needs to know more than “Vanguard detected something.” Riot cannot publish cheat-detection secrets in full; that would help cheat vendors. But it can publish categories of restricted behavior, recovery paths, and escalation rules.
A comparison helps clarify the difference:
| Enforcement action | Proportionate target | Risk profile |
|---|---|---|
| Block launch of Valorant | Riot’s game access | Narrower |
| Ban an account or HWID for cheating | Riot’s service | Serious but expected |
| Require firmware updates for affected boot security | System integrity for game access | Intrusive but explainable |
| Leave hardware unusable until OS reinstall, as reported | User’s broader PC environment | Harder to justify |
That last category is the problem. It makes the punishment feel permanent even if Riot sees it as protective.
Isn’t Riot justified because cheaters broke the rules first?
This is the strongest counterargument, and it deserves respect.
DMA cheating can wreck competitive integrity. In a tactical shooter like Valorant, small information advantages can decide rounds. If Riot does nothing, honest players pay the price while sophisticated cheaters operate with expensive tools that ordinary anti-cheat may miss.
Riot also has obligations beyond casual fairness. Ranked trust matters. Esports credibility matters. The experience of legitimate players matters. A company that markets competitive integrity cannot shrug at hardware cheats because enforcement is hard.
So yes, Riot should attack DMA cheating aggressively.
But aggression is not the same as unlimited authority. Blocking access to Riot games is one thing. Creating OS-level consequences that reportedly require a reinstall is another. The first protects Riot’s competitive environment. The second risks asserting control over the user’s machine.
How should Riot fight DMA cheats without claiming the whole PC?
Riot should draw a brighter line.
First, it should publish clearer technical and policy guidance on what categories of hardware behavior trigger Vanguard restrictions. Not exploit details. Not detection signatures. Categories. Players should understand whether the issue is suspicious DMA behavior, failed boot-security guarantees, motherboard firmware, or something else.
Second, Riot needs a recovery process that does not default to a full OS reinstall in disputed cases. If Notebookcheck’s reported workaround is accurate, Riot should explain why less destructive recovery is unavailable and what users can do before wiping a system.
Third, enforcement should stay proportional. Blocking Valorant is defensible. Blocking Riot accounts for proven cheating is defensible. Forcing hardware into a state where Windows must be rebuilt to restore access is the kind of measure that demands public justification, not celebratory mockery.
The practical takeaway for players is blunt: if you use unusual PCIe hardware, DMA tools, or custom firmware-heavy PC setups, Vanguard’s direction of travel should concern you even if you never cheat. The practical takeaway for Riot is sharper: fair play matters, but the price of a clean match should not be surrendering ownership of the PC itself.
The Stakes
- Riot’s anti-cheat push highlights how competitive integrity can require deeper access to players’ PCs.
- Remotely blocking hardware access raises concerns about who ultimately controls a user-owned gaming system.
- The reported OS reinstall recovery path could turn anti-cheat enforcement into a serious usability and ownership problem.










