• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    8 months ago

    Sure, but then you just need a youtube front running cache that preloads videos, or load multiple videos at the same time… i know i’m not the only person who watches youtube at 3x speed, so you could speed up past the ad, etc.

    • Amju Wolf@pawb.social
      link
      fedilink
      arrow-up
      1
      ·
      8 months ago

      They could use stream encryption (DRM) to ensure you’re viewing the ads as expected and make it hard to capture and playback.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        8 months ago

        Its a arms race, you could always just record the screen with a camera and edit it out as the ultimate.

        you could spin up a vm, and capture the video output

        you could use a graphics driver that lets you inspect the frame buffer, etc

        you could use the side channel attacks to get the decrypted video frames, heartbleed etc, etc etc

        • Amju Wolf@pawb.social
          link
          fedilink
          arrow-up
          1
          ·
          8 months ago

          Do these actually work against HDCP? (Outside using a camera, obviously). I know it used to work decently well against most “ordinary” attacks like VMs and capture cards.

          • jet@hackertalks.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            8 months ago

            I believe HDCP keys have already been leaked, I can find a couple different references to them on GitHub even.