←back to thread

798 points bertman | 1 comments | | HN request time: 0s | source
Show context
xeonmc ◴[] No.45899355[source]
In ten years time YouTube will be entirely inaccessible from the browser as the iPad kids generation are used to doomscrolling the tablet app and Google feels confident enough to cut off the aging demographic.
replies(9): >>45899394 #>>45899462 #>>45899465 #>>45899525 #>>45899536 #>>45900001 #>>45900317 #>>45900441 #>>45900653 #
vachina ◴[] No.45899536[source]
They’d need dedicated hardware to enforce any kind of effective DRM. Encrypted bitstream generated on the fly watchable only on L2 attested device.
replies(7): >>45899618 #>>45899734 #>>45899739 #>>45899807 #>>45900214 #>>45900945 #>>45902867 #
yard2010 ◴[] No.45899807[source]
Can you explain in simple terms what would prevent one from running the decryption programmatically posing as the end client?
replies(5): >>45900061 #>>45900104 #>>45900132 #>>45900160 #>>45903399 #
1. robmccoll ◴[] No.45900104{3}[source]
Let's say the only devices you can get that will run YouTube are running i/pad/visionOS or Android and that those will only run on controlled hardware and that the hardware will only run signed code. Now let's say the only way to get the YouTube client is though the controlled app stores on those platforms. You can build a chain of trust tied to something like a TPM in the device at one end and signing keys held by Apple or Google at the other that makes it very difficult to get access to the client implementation and the key material and run something like the client in an environment that would allow it to provide convincing evidence that it is a trusted client. As long as you have the hardware and software in your hands, it's probably not impossible, but it can be made just a few steps shy.