Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But they don't control the playback stack, once the attacker has the keys. The attacker brings their own stack, decrypting the data with their own software.


That doesn't help the attacker if their key can only decrypt the subset of frames which Netflix wants them to be able to decrypt.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: