Are they breaking Widevine? Are they circumventing it? If the end result is an analog audio signal and (a ton of) RBG on/off signals - why can’t I as a normal consumer capture it using some store bought gyzmo?

  • Alex@lemmy.ml
    link
    fedilink
    arrow-up
    17
    ·
    26 days ago

    Absolutely - modern pirates are extracting the digital streams with the DRM removed. However they closely guard the methods of operation because once the exploits or compromised keys are known they can be revoked and they have to start cracking again. They likely have hardware with reverse engineered firmware which won’t honour key revocation but still needs to be kept upto date with recent-ish keys.

    For example the Blu-Ray encryption protocols are well enough known you can get things working if you have the volume keys. However getting hold of them is tricky and you have to be careful your Blu-Ray doesn’t read a disk that revokes the old keys.

    For streaming things are a little easier because if you get the right side of the DRM you can simply copy the stream. However things like HDCP and moving DRM into secure enclaves are trying to ensure that the decryption process cannot be watched from the outside. I’m sure their are compromised HDCP devices but again once their keys get leaked they will no longer be able to accept a digital stream of data (or may negotiate down to a sub-HD rate).

    • ReginaPhalange@lemmy.worldOP
      link
      fedilink
      arrow-up
      1
      ·
      25 days ago

      But cracking ed25519, or RSA , is something that state actors can’t do without massive resources… What am I missing here?
      Even if I reverse engineer Linux, I can’t know the decryption keys for my encrypted data… Are you saying that HDCP is not “Secured” but “Jumbled up”? If tomorrow the source code for it get released - then “The jig is up”?

      • Alex@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        25 days ago

        In all DRM devices there are private signed certificates that can be used to establish a secure authenticated connection. To get at them you need to crack/hack/file the top of the chip to exfiltrate the certificate. More modern “Trusted Computing” like platforms include verified boot chains so even if you extract the certificate you couldn’t use it because you also need to sign the boot chain to ensure no code has been altered.