It is NOT pure developer laziness! The BF6 developers/EA had no choice but to implement these new requirements because of constant hacks cheats and exploits by unethical people. Gamers complain when game makers don't try hard enough to stop cheaters and then when those devs try to do the right thing people like you chime in that they are lazy without actually knowing why Linux has this issue and go straight to blaming the wrong people.
I'm no IT pro but it took only an hour trying to find proper TPM 2.0 firmware update and proper update tool to patch TPM vulnerabilities. I Simply patched current 2.0 module to most current version which took 5 minutes to update the module. Then took 5 min to download and update my UEFI firmware for my motherboard. Then 15 minutes to enable both secure boot functions and TPM and TMP and confirm everything was working properly. Total of not even 2 hours to do my part for the benefit of BF6 Anti cheat by implement secure boot and the bonus is my pc is now more secure for things not related to games!
I'm sure some companies devs would rather just sit on their *** and take the EZ route but NOT but bad actors gave them no other choice. So rather than being lazy/greedy by creating yet another crappy prematurely released buggy exploitable cheat ladened game just to sell more copies and get richer they decided on quality over quantity instead of lining their pockets. The additional toolset of secure boot and TPM is needed to better enforce or investigate cheat reports leading to a more enjoyable user experience. What BF6 is doing is setting a higher standard for themselves and will result in better future cheat blocking mechanisms/detection methods to keep up with modern advanced cheat methods. It minimizes the risk and the number of cheats getting past in the first place and a solid foundation to any good Anti cheat system. This deters & helps properly monitor to better ensure dishonest players are not easily getting around the Anti cheat by loading modified unofficial uncertified drivers at boot time.
By the way it's not the fault of EA or the DEVS that Linux don't properly support secure boot/TPM. Linux is open source so there are many different compilations from different dev teams and/or diff communities all together. Because of there being so many different versions and/or builds of LINUX, those Linux devs were lazy and took the EZ route and utilized exploit that at the time existed to make a workaround to load unofficial uncertified and possibly unsafe drivers by using now expiring/expired security keys which are used byTPM/UEFI Bios to properly authenticate the loading of official unmodified drivers. All Linux communities would have to work together to create a unified universal key and issue it for Linux and insure there is a list of secure certified drivers to boot to. UEFI Bios and TPM firmware would need to be updated by hardware vendors? maybe?
I'm no IT pro but it took only an hour trying to find proper TPM 2.0 firmware update and proper update tool to patch TPM vulnerabilities. I Simply patched current 2.0 module to most current version which took 5 minutes to update the module. Then took 5 min to download and update my UEFI firmware for my motherboard. Then 15 minutes to enable both secure boot functions and TPM and TMP and confirm everything was working properly.