Hacker News new | past | comments | ask | show | jobs | submit login
ARM Launches Hollywood Approved Anti-Piracy Processor (torrentfreak.com)
33 points by daker on June 4, 2013 | hide | past | favorite | 46 comments



By which Torrentfreak means "a video decoding IP block that is aware of TrustZone, which is fundamental security functionality for the whole ARM platform".

Actually, no, that's not what Torrentfreak means, because Torrentfreak has no idea what the hell any of those terms mean.


As tptacek points out, there's not much of a story here, this is just platform security. It does puzzle me why there is so much marketing and fuss around it though, as if a common source of leaks was "mobile video". As if somehow everyone in the world would turn into a source because they have Netflix on a Samsung phone. It's bizarre.

An effective anti-piracy system is a watermark detection routine embedded into the video decoder, so that you can't use hardware acceleration if the device detects the video isn't licensed.


Ain't it great how "trusted computing" is never about trusting you? And how the applications of trusted computing are never about, say, preventing your medical records from being spread around to people you don't know about?


But it can be about you trusting your device. And the applications of trusted computing are absolutely about preventing medical records from being compromised, but that's not a sexy headline in the same way that DRM is.


It is interesting to consider how content protection and platform security can be two sides of the same coin; how systems that keep code you write from snatching video frames from The Avengers can (often are) the same as the ones that keep malicious code on your device from stealing your credit card.


Except that when you allow a third party to put code in a trusted element, it's Big Brother Inside. It's like installing someone else's security camera in your house. Odious.


I wonder if the rootkit developers feel the same way, since the technology we're talking about (TZ) is designed to stop them as well.


Is there some reason to think that a rootkit could not use this technology? Do you have details about this system (which, to my knowledge, are proprietary) that leads you to be believe it is something other than a way to reduce user control of their own devices (which could be a good thing for a rootkit)?


It's a video decoding block that works with TrustZone. TZ is well-documented and conceptually very simple.


I have not been able to find anything other than marketing material; maybe I am just looking in the wrong places. Can you provide a link to some technical details?


Were you not looking on Google?

http://lmgtfy.com/?q=trustzone+arm

Read the first PDF on that page.


Absolutely. And I completely get the fear of losing control of one's own device, but given the downvotes I've had today on this topic - an open question:

What's the preferred approach amongst this audience to defend against malware on their platforms?


"What's the preferred approach amongst this audience to defend against malware on their platforms?"

Make hiding software hard, make reimaging the system easy.


For the record, I've already achieved this. It is not difficult.

1. Reduce the attack surface, i.e. total LOC. My base system is super small. More complex things can be run on top of it (e.g. via chroot), but the system I boot into is only about 16MB. With some effort, it could be shrunk to about 1/4 of that size.

2. Use only open source software; and refine your methods for searching through code for suspicious things. There's no shortage of open source solutions and folks right here on HN (e.g. Russ Cox) have been kind enough to share some decent methods for efficiently searching through code.

3. Boot from read-only external media, use a memory disk for the root filesystem and use tmpfs for all writable directories/partitions. This way boot times are fast and consistent, more so than with harddisk drives. And with the rootfs in memory, you can remove the external media after booting, freeing up the USB or SD card port for other things. It's very easy to replicate (clone, image, whatever you choose to call it) this system and transfer it to more external media. It takes only a short time to compile from scratch, even on underpowered computers. There is no "software installation". You insert the media and boot. That's it. You get the same pristine system every time you boot.

To anyone who injects doubt and insinuates that such an approach to evading malware as betterunix suggests is infeasible or unachievable: I'm happy to prove you wrong.


This system of yours sounds very interesting. Did you strip down an existing GNU/Linux distro, or build a base system from scratch? A pointer to an ISO image and/or repo with build scripts would be great.


And you would do that exactly how? Be as specific as you can.


They are just design principles; I did not claim to have a well-planned design ready to go to market. Some operating systems make it harder to hide software than others; GNU/Linux makes hiding software more difficult than Windows or Mac OS X. Some computers are easier to reimage than others (e.g. special key sequences during the boot process will cause a "factory reset").


You can't trust a device which has DRM.


"But you can't trust a device on which the video decoder silicon understands the TZ bits".


In the case where you have no control over the decoder while using the system. Is it clearer now? If you have control - then it's a non issue. Same as TPM can be used for something useful, but can be used for reducing user's control.


Yes, you have control.


If you have control (and can disable applying this to video decoding), what is the point for the DRM lobby to push for this thing? Their usual idea is to take control away.


This is a video decoder IP block that is simply compatible with the security architecture of the rest of the system. The only reason you think "the DRM lobby" is pushing for it is because Torrentfreak wrote that. Torrentfreak is a laughable source of technical content.


So you are implying that it's not related to encryption of the video?


Really? Are there any real-world examples?


Yes: the Intel TPM / Secure Boot system's design goal is to stop rootkits, but is also used by vendors to load secure video decoding code.


"Yes: the Intel TPM / Secure Boot system's design goal is to stop rootkits"

Why would you need any cryptography to do this? I have a computer that uses a much simpler, equally effective, and easier-to-use approach: the boot sector cannot be overwritten unless the system is rebooted in a special mode (and the OS cannot be booted in that mode). At least for personal computing, that is far better than a system that forces people to rely on a trusted third party to decide what software they can run.


TZ is not cryptographic. You should go read about it. It's an interesting design approach.


The TPM and "secure boot," which you brought up, are cryptographic. That is what I was replying to, sorry if that was not clear enough.


That's an odd meaning of "secure."


I'm sorry that engineering terminology isn't invariably compatible with your politics.


The post above referred to patient control over medical records using trusted elements.

Is there a real-world case where any bureaucracy has yielded control of individuals' documents to those individuals through the use of trusted computing? Anywhere? In any subject matter? Is there any case where I can submit a documents and then be assured that i can revoke access? Anyone? Bueller?


Yes, there is, since "trusted computing" mostly refers to the idea of locking your running OS down so that attackers can't persist code that alters it. Which makes your clumsy "Bueller" thing all the funnier: it's like you literally can't imagine that hardware should be any more secure than an 80386.


It was discussed here 6 hours ago: https://news.ycombinator.com/item?id=5817984


Sorry about that!


And now it's our turn to break the DRM!


Break? There is always - and will always be - the analog loop.

This is a silly invention for media executives that do not understand (1) their customers or (2) those dedicated to pirating their content.



Relevant xkcd: http://xkcd.com/129/


Another DRM idiocy shoved onto the oblivious consumers. Users should know to avoid these GPUs now.


It's not a GPU.


What is it exactly? An optional chip that you can unplug? It comes as one package in the GPU.


It's a video decoder IP block; it's one of a large number of IP blocks you can assemble like lego pieces to design an ARM system.


But you (as a user) can't make it optional, once it's there, right?


What exactly do you think this piece of technology does? I'm having trouble articulating how optional it is. I think you might think this is something that infects your operating system and watches your keystrokes.


Allows using an encrypted video stream not accessible to the user without any means of disabling this obscuring?




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: