this post was submitted on 02 Nov 2024
41 points (95.6% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54577 readers
199 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

Hey, I finally learned how to break widevine and managed to get some drm content decrypted. I did this woth tubi which was relatively easy. So, Next I would like to embark on the adventure of decrypting some paid streamings, esp. D1sn3y and H8O M1X. any tutorials on that? From what I tried, the process is not as simple as with tubi (maybe because tubi is mkre straightforwaed and free?). Anyway, Im eager to learn and would be grateful of any good guide on that. 🏴‍☠️

Edit: Okay, since I grasped bascics, now its getting easier and I managed to download some content from D1sn3y using N_m3u8DL-RE but only in 720p. Is it possible to get it in 1080p?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 7 points 1 week ago* (last edited 1 week ago) (4 children)

I have heard about a TamperMonkey userscript called EMELogger that logs some information about EME, in the web tools console making it easier to get the PSSH. I haven't tried it though.

Also, I don't think you will find guides on paid content as this is considered highly illegal (I think).

[–] [email protected] 4 points 1 week ago (3 children)

I dont have issues with getting pssh or lic url - I got it already. But im in a situation in which i possesse decrypting key of content and need the content itself - in highest quality ofc. I fully understand why there are not a lot of guides for those - maybe some vip will pm me and give me some instructions tho.

[–] [email protected] 2 points 1 week ago (1 children)

Oh, I missed the L1 in the title. Basically, all the decryption at L1 is happening inside a Trusted Execution Environment. This is a dedicated chip that does all encryption-decryption (among other things). This is why it is so difficult to extract the keys, because they don't enter the CPU or are stored in RAM, because the dedicated chip handles all of these.

So I don't think you can find a guide about this, because if anyone has found even one exploit, they would be keeping it to ourselves, so that it doesn't get patched.

Although it is very difficult, I think the only real solution is to reverse engineer a TEE and find an exploit yourself.

If you manage to do this, please let me know! I am happy to get updates about progress in this topic.

[–] [email protected] 2 points 1 week ago

hahaha I wish I would, Im not so skilled tho

load more comments (1 replies)
load more comments (1 replies)