zlacker

[parent] [thread] 9 comments
1. whatsh+(OP)[view] [source] 2023-07-25 07:28:44
>once a copy of the content is server to AT LEAST one attested user agent – what prevents him from sharing his copy with unattested users?

This is already covered by the DRM in all major web browsers today. If your software will allow that, it can't get attested.

replies(1): >>gloosx+M2
2. gloosx+M2[view] [source] 2023-07-25 07:52:40
>>whatsh+(OP)
I don't understand – how exactly DRM knows that I have a video-capture card recording my screen right now? The browser has no idea.

Or what prevents me from copying NYT article and re-hosting it? What DRM has to do with it?

replies(2): >>kuschk+6f >>fiftee+Rw
◧◩
3. kuschk+6f[view] [source] [discussion] 2023-07-25 09:48:11
>>gloosx+M2
Google's DRM today already enforces HDCP. You only see an encrypted mess in all debug tools of the browser in that case.
replies(1): >>gloosx+DP3
◧◩
4. fiftee+Rw[view] [source] [discussion] 2023-07-25 12:15:19
>>gloosx+M2
I'm out of the loop of current DRM.

I assume it's something like the old Protected Media Path.

For example, if you try to screenshot a Netflix video all you screenshot is a dark-pinkish square, because the video is probably added by the graphics card at the last moment.

◧◩◪
5. gloosx+DP3[view] [source] [discussion] 2023-07-26 06:36:49
>>kuschk+6f
i dont need debug tools in the browser - if the bytes of encoded content are getting transmitted to the socket on my machine, there is no realistic way to prevent me from taking and replicating them, i don't see how some software inside the browser can have any effect on this, because the browser has zero idea where these bytes can go after they hit the socket. A good analogy would be filming your screen manually - computer has no idea of this filming and in no way can prevent it, because it cannot act on a real world around it, the same applies for browser, i can take a document, video or sound from any page without involing the browser
replies(1): >>kuschk+X04
◧◩◪◨
6. kuschk+X04[view] [source] [discussion] 2023-07-26 08:12:21
>>gloosx+DP3
> because the browser has zero idea where these bytes can go after they hit the socket

The attestation uses a secure enclave in your processor with a secret key you can't access to verify that secure boot is on, you booted a signed OS, the OS is in locked-down mode, etc.

replies(1): >>gloosx+EV7
◧◩◪◨⬒
7. gloosx+EV7[view] [source] [discussion] 2023-07-27 06:12:44
>>kuschk+X04
>The attestation uses

>you can't access

Don't you see how contradictory this is?

No secure enclave of registers or hidden secret keys can help, because a person can utilize the lower-level physical world around the processor to manipulate it (e.g sending electrical currents from a programator device manually). But that is a last resort, there are simple software attacks available already to fake as many "attested" devices as needed (for the same DRM system of Android). It will only bring more jeopardy to the "integrity"

replies(1): >>kuschk+5f8
◧◩◪◨⬒⬓
8. kuschk+5f8[view] [source] [discussion] 2023-07-27 08:57:30
>>gloosx+EV7
See that's exactly the issue why I hate this. You can always circumvent it, worst case with an electron microscope and some acid. So all it really does is prevent the average user from gaining control over their own hardware.

And for tech-minded people it doesn't fundamentally change anything, it just means that it now takes more time to do the same than before

replies(1): >>gloosx+Gt8
◧◩◪◨⬒⬓⬔
9. gloosx+Gt8[view] [source] [discussion] 2023-07-27 10:50:54
>>kuschk+5f8
True, a cat-and-mouse game going on forever. Anyways, I don't believe they can succeed in walling such a monstrosity of technologies as the web, just by controlling some parts of it, even significant parts like the browser or search. It is only something governments can do by requiring a passport scan each time you open a connection (which is closing when you eject the passport from the scanner)
replies(1): >>ninten+Wre
◧◩◪◨⬒⬓⬔⧯
10. ninten+Wre[view] [source] [discussion] 2023-07-28 23:13:01
>>gloosx+Gt8
This is why Risc-V being developed in China and other countries and exported elsewhere is ironically a good thing at the base-level of computing. The chinese computers will require China's bugs, whereas exported good will NOT have it, otherwise it won't be bought.
[go to top]