Are they breaking Widevine? Are they circumventing it? If the end result is an analog audio signal and (a ton of) RBG on/off signals - why can’t I as a normal consumer capture it using some store bought gyzmo?

  • ReginaPhalange@lemmy.worldOP
    link
    fedilink
    arrow-up
    1
    ·
    14 hours ago

    But cracking ed25519, or RSA , is something that state actors can’t do without massive resources… What am I missing here?
    Even if I reverse engineer Linux, I can’t know the decryption keys for my encrypted data… Are you saying that HDCP is not “Secured” but “Jumbled up”? If tomorrow the source code for it get released - then “The jig is up”?

    • Alex@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      14 hours ago

      In all DRM devices there are private signed certificates that can be used to establish a secure authenticated connection. To get at them you need to crack/hack/file the top of the chip to exfiltrate the certificate. More modern “Trusted Computing” like platforms include verified boot chains so even if you extract the certificate you couldn’t use it because you also need to sign the boot chain to ensure no code has been altered.