this post was submitted on 21 Oct 2024
41 points (100.0% liked)

No Stupid Questions

35584 readers
1522 users here now

No such thing. Ask away!

!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must be legitimate questions. All post titles must include a question.

All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.



Rule 2- Your question subject cannot be illegal or NSFW material.

Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding META posts and joke questions.

Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.

On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.

If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.



Rule 7- You can't intentionally annoy, mock, or harass other members.

If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here.



Credits

Our breathtaking icon was bestowed upon us by @Cevilia!

The greatest banner of all time: by @TheOneWithTheHair!

founded 1 year ago
MODERATORS
 

Are they breaking Widevine? Are they circumventing it? If the end result is an analog audio signal and (a ton of) RBG on/off signals - why can't I as a normal consumer capture it using some store bought gyzmo?

top 17 comments
sorted by: hot top controversial new old
[–] subtext@lemmy.world 3 points 4 hours ago

I think the reason why regular store bought gizmos won’t let you decrypt it is because content can require HDCP to make sure you don’t gain access to the data. If there were a device at Best Buy that just bypassed this, I think the DMCA and rights holders would come down hard on the seller.

I’ve heard of gizmos from shadier places may be able to decrypt the data but it’s likely because they’re acting outside of the law.

[–] lung@lemmy.world 29 points 11 hours ago (2 children)

Basically, media cannot truly be DRM because: (1) it ~has to be converted into data that screens and speakers can display (2) ultimately if it's fetching widevine encryption keys, those keys are somewhere in your device and can be retrieved

So yes, you can do it. A "capture card" is such a "gyzmo" — but often, you can just rip using software, i.e. record the decoded stream

[–] MissJinx@lemmy.world 4 points 7 hours ago* (last edited 7 hours ago)

it's not even hard. It's just to much work, if someone else is doing it for me I thank them with thoughts and prayers (and sometimes I donate money)

Funny enough sometimes I'll download shows that I already paid for (like Max ot Netflix) just becaus VLC is great and my TV is not

[–] unmagical@lemmy.ml 22 points 11 hours ago (2 children)

To put it another way:

  • If you want to see something it has to be clear (unencrypted)
  • If you want to see something on your computer it has to be on your computer
  • You can control your own computer

Therefore, any media that is viewed on your computer is clear, on your computer, in a realm that you control.

This is also why ad blockers work. You can send me ads, or requests to fetch ads and my computer just ignores them.

Companies will never be able to stop this, cause at some point you can always just intercept the data feed at a hardware level and reconstruct the stream.

[–] vala@lemmy.world 11 points 8 hours ago (2 children)

Companies will never be able to stop this,

If they have their way they will. All the tech bros are pushing for trusted computing platforms.

Imagine a world where most/all computers are as locked down as an iPad. That's what they seem to want.

[–] Takumidesh@lemmy.world 4 points 5 hours ago

TPM isn't inherently bad, it's just a way to cryptographically store keys. TPM overall is great as it gives you a very secure way to store things like encryption keys.

You also don't need TPM to lock down a system. Locked bootloaders have existed for decades and platforms have historically rolled their own encryption modules as they wanted, like your ipad example, or any video game console in the last 20 years, or most mobile phones, etc.

The 'knows enough to be dangerous' crowd has been fearmongering about tpm since it's been introduced, it isn't some magic bullet for vendor locking, since vendor locking is already achieved.

[–] unmagical@lemmy.ml 5 points 6 hours ago

At some point the electrical signal has to be clear at a hardware level. Companies can make it harder, but if they're streaming any info to a device in your possession someone will be able to extract that clean electrical signal and reproduce an acceptable feed.

[–] GrammarPolice@lemmy.world 5 points 9 hours ago (3 children)

I might be asking a dumb question, but why can't the companies host their ads on the server-side? Do the ads have to be on my computer for me to see them? What does being on my computer even mean in this context?

Sorry if this is a stupid question

[–] CallOfTheWild@lemmy.world 8 points 9 hours ago (1 children)

Some do. YouTube switched their ad service so the main video and ads come from the same server. To get around this uBlock now blocks the script on the browser side that shows the ad, then returns a signal that the timer is up.

It's a constant game of cat and mouse to get around ad blockers then block that new method.

[–] count_dongulus@lemmy.world 2 points 7 hours ago

I don't think the new strategy of injecting ads directly into the video stream can be defeated in realtime though. It's like how you cannot defeat tv ads...you can blank the screen, or record and restitch without the ads, but the content itself has the ad. YouTube is a bit different where you can theoretically skip ahead, but your device has to tell Youtube that it wants to skip ahead in order to actually even get the video content, and youtube can look at request timestamps to know you didn't see the whole injected ad and just re-inject it in the video stream.

[–] HeckGazer@programming.dev 6 points 9 hours ago* (last edited 9 hours ago) (1 children)

They do host them on their servers, sort of (if you're asking how ad brokers work that's a bit of a different scope).

Does poo have to be on your desk to smell it?
The post office (website) is telling you (your computer) to go over and pick up a parcel of poo (an ad) that's there for you.
You say no, I don't think I will (adblock/poo block)

[–] GrammarPolice@lemmy.world 1 points 7 hours ago

That is one hell of an analogy

[–] unmagical@lemmy.ml 5 points 9 hours ago (1 children)

What I mean by "on your computer" is not that it originates on your computer, but that some form of it exists there--namely this is going to be images, text, links, etc that the ad company hosts and a website will normally download temporarily along with the rest of the site's content. Once your computer has that site's information you can do anything you want with it. Importantly what exists on your computer is a local copy of what the ad servers host. If you decide to color ads blue on your computer that only affects your copy. The original ad, and everyone else's copies remain intact.

[–] GrammarPolice@lemmy.world 1 points 7 hours ago

I think I understand now. Thanks.

[–] stsquad@lemmy.ml 16 points 11 hours ago (1 children)

Absolutely - modern pirates are extracting the digital streams with the DRM removed. However they closely guard the methods of operation because once the exploits or compromised keys are known they can be revoked and they have to start cracking again. They likely have hardware with reverse engineered firmware which won't honour key revocation but still needs to be kept upto date with recent-ish keys.

For example the Blu-Ray encryption protocols are well enough known you can get things working if you have the volume keys. However getting hold of them is tricky and you have to be careful your Blu-Ray doesn't read a disk that revokes the old keys.

For streaming things are a little easier because if you get the right side of the DRM you can simply copy the stream. However things like HDCP and moving DRM into secure enclaves are trying to ensure that the decryption process cannot be watched from the outside. I'm sure their are compromised HDCP devices but again once their keys get leaked they will no longer be able to accept a digital stream of data (or may negotiate down to a sub-HD rate).

[–] ReginaPhalange@lemmy.world 1 points 9 hours ago (1 children)

But cracking ed25519, or RSA , is something that state actors can't do without massive resources... What am I missing here?
Even if I reverse engineer Linux, I can't know the decryption keys for my encrypted data.... Are you saying that HDCP is not "Secured" but "Jumbled up"? If tomorrow the source code for it get released - then "The jig is up"?

[–] stsquad@lemmy.ml 3 points 8 hours ago

In all DRM devices there are private signed certificates that can be used to establish a secure authenticated connection. To get at them you need to crack/hack/file the top of the chip to exfiltrate the certificate. More modern "Trusted Computing" like platforms include verified boot chains so even if you extract the certificate you couldn't use it because you also need to sign the boot chain to ensure no code has been altered.