Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Sunday November 15 2020, @01:46AM   Printer-friendly
from the closing-the-barn-door dept.

Google Takes Down Repositories That Circumvent its Widevine DRM

GitHub has removed several repositories that helped to bypass Google's Widevine DRM, which is used by popular streaming services such as Netflix and Amazon. Google requested the code to be removed as it would violate the DMCA. The company also sent a sensitive data takedown request for the associated RSA key which, ironically, remains easy to find through Google.

[...] The code, originally published by security researcher Tomer Hadad, is a proof-of-concept code Chrome extension that shows how easy it is to bypass the low-security ["L3" version of Widevine Digital Rights Management]. Google was aware of this vulnerability and previously informed Krebs on Security that it would address the issue.

[...] Google sees the code, which was explicitly published for educational purposes only, as a circumvention tool. As such, it allegedly violates section 1201 of the DMCA, an allegation that was also made against the youtube-dl code last month.

[...] This 'key controversy' is reminiscent of an issue that was widely debated thirteen years ago. At the time, a hacker leaked the AACS cryptographic key "09 F9" online which prompted the MPAA and AACS LA to issue DMCA takedown requests to sites where it surfaced.

DMCA: Digital Millennium Copyright Act
DRM: Digital Rights Management
AACS: Advanced Access Content System
MPAA: Motion Picture Association of America
AACS: Advanced Access Content System
AACS LA: https://en.wikipedia.org/wiki/AACS_LA


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by Mojibake Tengu on Sunday November 15 2020, @07:05AM (2 children)

    by Mojibake Tengu (8598) on Sunday November 15 2020, @07:05AM (#1077524) Journal

    As we can remember, AACS key was popularized (and transferred, too) as printed on T-shirts.

    That brings up an idea of using tattoo for both offline recording, conservation and proliferation of important code.
    Putting tattoo on a messenger for critical message transfer is not new concept, it was used since ancient times.

    Or at least we will truly see if inviolability of person/body is still higher value in liberal democracy than digital rights appropriated by oligarchy.
    Volunteers?

    --
    The edge of 太玄 cannot be defined, for it is beyond every aspect of design
    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2) by TrentDavey on Sunday November 15 2020, @04:55PM

    by TrentDavey (1526) Subscriber Badge on Sunday November 15 2020, @04:55PM (#1077599)

    Or they get tattooed voluntarily ala Prison Break -
    "... his genius scheme: install himself in the same prison by holding up a bank and, as the final month ticks away, launch the escape plan step-by-step to break the both of them out, with his full-body tattoo acting as his guide; a tattoo which hides the layout of the prison facility and necessary clues vital to the escape. Written by filipfilipovich@hotmail.com"

  • (Score: 2) by rob_on_earth on Monday November 16 2020, @12:33PM

    by rob_on_earth (5485) on Monday November 16 2020, @12:33PM (#1077787) Homepage

    There were numerous instances of people singing or in other ways performing the long HEX string.

    Steganography also had a big boost from people hiding the key and sharing the images. Not to mention images that had the key "rendered".

    A number of people were looking for ways to represent the AACS key in mathematical formulas, which would have been the best result as none of the AACS key is being transferred when the information was shared.

    Of course, I also remember having to copy and paste the damn key just to watch my own paid for DVDs in Linux.