Questions tagged [drm]
DRM (digital rights management) is the enforcement of restrictions on access control to data through technical means, such as copy protection.
130
questions
1
vote
1
answer
91
views
Couldn't an HDCP bypass "attack" always be done losslessly, given a known compression algorithm was used?
When DRM-protected video is displayed on an output device, these streams are sometimes saved and re-encoded, resulting in quality loss. However, let's say we can obtain the outputted video in a pixel-...
13
votes
6
answers
7k
views
Is it impossible to protect an API from data redistribution?
Say there is a frontend mobile app and a backend server (let's call this service MyApp) which hosts an API for the mobile app to connect to. The backend server makes any needed requests to third party ...
0
votes
0
answers
152
views
How to prevent public key tampering
I have to store a document (e.g. a JSON file) on a remote PC (that my App is running on) alongside a signature to be able to verify that this file was signed by me. I have no access to this PC nor ...
8
votes
1
answer
3k
views
Displaying on screen without being recordable by another app
A couple years ago I rented a movie on iTunes and began watching it in the Windows 10 x64 desktop app.
At one point, I opened OBS in capture screen mode. To my amazement, the iTunes window showed only ...
1
vote
1
answer
315
views
Could the Brain virus technically prevent software piracy?
The Brain virus is an early virus targeting the IBM PC / MS DOS platform.
Sometimes, it is claimed that one of the virus' purpose was to prevent the copying of some software that the virus was ...
1
vote
3
answers
142
views
Is there a way to store data securely on a client so that it can only be read by the client while connected to an authorising source?
I have a difficult issue facing an online gaming social space I frequent where personal content I've made for the platform is being stolen by users.
I'm wondering if there are any solutions to make ...
1
vote
0
answers
332
views
How do screenshot blocking technologies work? [closed]
I've noticed I can't take screenshots of videos in Star+. When I paste whatever I tried to shot, it comes all black (subtitles however are visible). After some research, I found out it happens with ...
1
vote
0
answers
2k
views
Why can I watch videos on Crunchyroll without having DRM content enabled in Firefox?
The title pretty much covers the question. I'm using Linux and, whenever I go to sites like Amazon Prime and such, if I try to watch any of their videos, the player would error out in an error code ...
1
vote
0
answers
210
views
How to find applications which use Replay Protected Memory Block (RPMB) partition of the underlying storage device in Android Trusty? [closed]
I am trying to find a list of applications which use RPMB partition in the underlying Storage Device (eMMC/UFS/NVMe) in Android Trusty environment.
How do I go about doing this ?
Thanks
0
votes
2
answers
359
views
How to put executable code in files? [closed]
I have PDF, Word and MP4 files on my site and I want to protect them from illegal downloading even if my site hacked. I want to put executable code in the files, so if someone downloads and opens them,...
2
votes
2
answers
2k
views
How to decrypt a file to memory and run it from memory?
How someone might run an encoded executable, mp3, or any other file safely in memory after being decrypted.
A use case might be someone trying to make code or a file only usable through their service ...
0
votes
1
answer
150
views
Can a source code be shared and secured form unauthorized use at the same time?
We have developed a script that generates certain reports as output. Input data being confidential in nature, one of our clients wants the code to be hosted in their country and also for the business ...
-1
votes
1
answer
261
views
securing certificate based authentication for linux and windows applications
I am wondering what are the possible options for the following:
Let's say you have a software-agent you want to deploy on systems running both on Windows and Linux, e.g. an agent written in C++.
Let's ...
0
votes
1
answer
220
views
How to prevent Source code excessive usage and redistribution?
We sell our code to a company that they can run our code 100 times a month. We need to do a few things before giving the code to the company.
Hide our logic (we can hide our logic by code obfuscation)...
2
votes
0
answers
485
views
DRM implementation for offline licensing
I am improving one of the DRMs that I'm using for my software, and I have a few questions about how to best implement transferable licenses for offline computers. But first, a disclaimer - I am very ...