←back to thread

449 points bertman | 1 comments | | HN request time: 0s | source
Show context
_fn2y ◴[] No.29706198[source]
I did one of these for Hulu (https://github.com/chris124567/hulu) a while back. It didn't take very long to write. Most of these programs are just using the pywidevine library along with some key that's been leaked (if you know how to navigate Github search you can find one in a couple of minutes) and then integrating the streaming site's API. I wrote mine in Go because I got sick of the pywidevine hegemony and I felt it was unnecessarily complicated. The annoying thing is that key revocations are happening pretty frequently now. It's another one of those pointless cat and mouse games.
replies(1): >>29709837 #
dontreact[dead post] ◴[] No.29709837[source]
from ◴[] No.29716497[source]
I'm not sure there's some rigorous ethical justification but it's only available to people who have a Hulu account so they could just watch the movies on hulu.com instead of downloading them anyways. It also makes watching Hulu possible to people who don't want to run an opaque obfuscated library (Widevine) on their computer (also people who use musl libc [like myself] which Widevine doesn't work on). Hulu ripping was happening long before this software so I doubt it will have any impact in the grand scheme of things. It was mostly just written for my own fun.
replies(1): >>29719711 #
1. sillysaurusx ◴[] No.29719711[source]
Just wanted to say thanks, both for writing it and for not being ashamed of it. And also for being honest that reverse engineering is often really fun. (Unlike being an actual pentester, which mostly consists of writing TPS reports.)

P.S. To lighten the mood a little, I have a different question for you. Why "from"? It's a great name; I'm just super curious if there's any meaning. Also surprised that a Python reserved word was available on HN in 2019 -- most of those were snatched up in 2008.