←back to thread

449 points bertman | 2 comments | | HN request time: 0.73s | source
Show context
sydthrowaway ◴[] No.29702696[source]
I've often wondered how easy it would be for people in the scene to rip Netflix or others streaming content. Isn't it as simple as getting the URL of the video player element in the browser and using cURL or wget?
replies(5): >>29702739 #>>29702740 #>>29702745 #>>29702784 #>>29703754 #
alt227 ◴[] No.29702740[source]
It is, but the resulting files are encrypted. Hence this post being about exposing CDMs (Content Decryption Modules). These use decryption keys obtained through hacking or paying internal staff. Once the decryption keys are exposed like this then the content providers 'burn'; them and generate new ones meaning the process has to start over again.
replies(1): >>29702831 #
ordx ◴[] No.29702831[source]
I assume at some point Widevine plugin decrypts these files to display the actual video stream in the browser, correct? Why don't they capture already decrypted stream?
replies(4): >>29702898 #>>29702911 #>>29704039 #>>29704316 #
e3bc54b2 ◴[] No.29702898[source]
That's why they now embed displays with verification modules. Basically whole stack from server to your display is a giant chain verifying you are not doing what they don't want you to do.
replies(2): >>29702944 #>>29703186 #
1. Scoundreller ◴[] No.29702944[source]
Though often they get it wrong, like when I bought a movie off Apple and it errored when I screen mirrored to my dumb TV and it’s back to piracy first for me.
replies(1): >>29719635 #
2. ArchOversight ◴[] No.29719635[source]
Your dumb TV doesn't have the appropriate HDCP chips, which is why it errored. Your computer didn't know whether it was a dumb TV or if it was an HDMI capture card ready to rip the movie...

Not that I agree with the practice.