←back to thread

449 points bertman | 1 comments | | HN request time: 0.247s | source
Show context
sydthrowaway ◴[] No.29702696[source]
I've often wondered how easy it would be for people in the scene to rip Netflix or others streaming content. Isn't it as simple as getting the URL of the video player element in the browser and using cURL or wget?
replies(5): >>29702739 #>>29702740 #>>29702745 #>>29702784 #>>29703754 #
alt227 ◴[] No.29702740[source]
It is, but the resulting files are encrypted. Hence this post being about exposing CDMs (Content Decryption Modules). These use decryption keys obtained through hacking or paying internal staff. Once the decryption keys are exposed like this then the content providers 'burn'; them and generate new ones meaning the process has to start over again.
replies(1): >>29702831 #
ordx ◴[] No.29702831[source]
I assume at some point Widevine plugin decrypts these files to display the actual video stream in the browser, correct? Why don't they capture already decrypted stream?
replies(4): >>29702898 #>>29702911 #>>29704039 #>>29704316 #
1. Scoundreller ◴[] No.29702911[source]
My thought is that the decryption and decompression are interlinked.

So while it’s relatively easy to get the raw stream, if you want to re-distribute it, you’ll have to compress it again.

With these leaks, you can get the compressed and decrypted files and re-distribute without any added compression loss.

Maybe I’m wrong, but it’s the only thing that makes sense to me.