Skip to main content

Questions tagged [drm]

DRM (digital rights management) is the enforcement of restrictions on access control to data through technical means, such as copy protection.

1 vote
1 answer
91 views

Couldn't an HDCP bypass "attack" always be done losslessly, given a known compression algorithm was used?

When DRM-protected video is displayed on an output device, these streams are sometimes saved and re-encoded, resulting in quality loss. However, let's say we can obtain the outputted video in a pixel-...
stenlan's user avatar
  • 1,271
13 votes
6 answers
7k views

Is it impossible to protect an API from data redistribution?

Say there is a frontend mobile app and a backend server (let's call this service MyApp) which hosts an API for the mobile app to connect to. The backend server makes any needed requests to third party ...
Jiehfeng's user avatar
  • 233
0 votes
0 answers
152 views

How to prevent public key tampering

I have to store a document (e.g. a JSON file) on a remote PC (that my App is running on) alongside a signature to be able to verify that this file was signed by me. I have no access to this PC nor ...
Croksie's user avatar
8 votes
1 answer
3k views

Displaying on screen without being recordable by another app

A couple years ago I rented a movie on iTunes and began watching it in the Windows 10 x64 desktop app. At one point, I opened OBS in capture screen mode. To my amazement, the iTunes window showed only ...
Luke Sawczak's user avatar
1 vote
1 answer
315 views

Could the Brain virus technically prevent software piracy?

The Brain virus is an early virus targeting the IBM PC / MS DOS platform. Sometimes, it is claimed that one of the virus' purpose was to prevent the copying of some software that the virus was ...
FlorianZiegler's user avatar
1 vote
3 answers
142 views

Is there a way to store data securely on a client so that it can only be read by the client while connected to an authorising source?

I have a difficult issue facing an online gaming social space I frequent where personal content I've made for the platform is being stolen by users. I'm wondering if there are any solutions to make ...
Nidonocu's user avatar
  • 111
1 vote
0 answers
332 views

How do screenshot blocking technologies work? [closed]

I've noticed I can't take screenshots of videos in Star+. When I paste whatever I tried to shot, it comes all black (subtitles however are visible). After some research, I found out it happens with ...
sourcream's user avatar
  • 111
1 vote
0 answers
2k views

Why can I watch videos on Crunchyroll without having DRM content enabled in Firefox?

The title pretty much covers the question. I'm using Linux and, whenever I go to sites like Amazon Prime and such, if I try to watch any of their videos, the player would error out in an error code ...
Alex's user avatar
  • 167
1 vote
0 answers
210 views

How to find applications which use Replay Protected Memory Block (RPMB) partition of the underlying storage device in Android Trusty? [closed]

I am trying to find a list of applications which use RPMB partition in the underlying Storage Device (eMMC/UFS/NVMe) in Android Trusty environment. How do I go about doing this ? Thanks
nishad kamdar's user avatar
0 votes
2 answers
359 views

How to put executable code in files? [closed]

I have PDF, Word and MP4 files on my site and I want to protect them from illegal downloading even if my site hacked. I want to put executable code in the files, so if someone downloads and opens them,...
johny's user avatar
  • 9
2 votes
2 answers
2k views

How to decrypt a file to memory and run it from memory?

How someone might run an encoded executable, mp3, or any other file safely in memory after being decrypted. A use case might be someone trying to make code or a file only usable through their service ...
Cayne Brister2's user avatar
0 votes
1 answer
150 views

Can a source code be shared and secured form unauthorized use at the same time?

We have developed a script that generates certain reports as output. Input data being confidential in nature, one of our clients wants the code to be hosted in their country and also for the business ...
U7786's user avatar
  • 1
-1 votes
1 answer
261 views

securing certificate based authentication for linux and windows applications

I am wondering what are the possible options for the following: Let's say you have a software-agent you want to deploy on systems running both on Windows and Linux, e.g. an agent written in C++. Let's ...
aquilares's user avatar
  • 129
0 votes
1 answer
220 views

How to prevent Source code excessive usage and redistribution?

We sell our code to a company that they can run our code 100 times a month. We need to do a few things before giving the code to the company. Hide our logic (we can hide our logic by code obfuscation)...
user241348's user avatar
2 votes
0 answers
485 views

DRM implementation for offline licensing

I am improving one of the DRMs that I'm using for my software, and I have a few questions about how to best implement transferable licenses for offline computers. But first, a disclaimer - I am very ...
Justinas Rubinovas's user avatar

15 30 50 per page
1
2 3 4 5
9