←back to thread

449 points bertman | 1 comments | | HN request time: 0.267s | source
Show context
sydthrowaway ◴[] No.29702696[source]
I've often wondered how easy it would be for people in the scene to rip Netflix or others streaming content. Isn't it as simple as getting the URL of the video player element in the browser and using cURL or wget?
replies(5): >>29702739 #>>29702740 #>>29702745 #>>29702784 #>>29703754 #
alt227 ◴[] No.29702740[source]
It is, but the resulting files are encrypted. Hence this post being about exposing CDMs (Content Decryption Modules). These use decryption keys obtained through hacking or paying internal staff. Once the decryption keys are exposed like this then the content providers 'burn'; them and generate new ones meaning the process has to start over again.
replies(1): >>29702831 #
ordx ◴[] No.29702831[source]
I assume at some point Widevine plugin decrypts these files to display the actual video stream in the browser, correct? Why don't they capture already decrypted stream?
replies(4): >>29702898 #>>29702911 #>>29704039 #>>29704316 #
e3bc54b2 ◴[] No.29702898[source]
That's why they now embed displays with verification modules. Basically whole stack from server to your display is a giant chain verifying you are not doing what they don't want you to do.
replies(2): >>29702944 #>>29703186 #
GekkePrutser ◴[] No.29703186[source]
And see how well it works. 2 hours after airing everything is online. The only ones they're giving any hassle are legitimate consumers.
replies(2): >>29703790 #>>29709676 #
1. e3bc54b2 ◴[] No.29709676[source]
These things are designed to hassle legitimate customers only. Pirates are never going to pay anyway. DRM is so they can squeeze more out of paying customers.