The author theorizes that games are an ideal malware delivery vehicle but... aren't games typically connected to a user's headset/mic regardless?
I'm a bit puzzled how "secure environment" has a direct connection to "data collection" and "adversary".