Comment on What kind of special knowledge or equipment does piracy groups have?

<- View Parent
stsquad@lemmy.ml ⁨3⁩ ⁨weeks⁩ ago

In all DRM devices there are private signed certificates that can be used to establish a secure authenticated connection. To get at them you need to crack/hack/file the top of the chip to exfiltrate the certificate. More modern “Trusted Computing” like platforms include verified boot chains so even if you extract the certificate you couldn’t use it because you also need to sign the boot chain to ensure no code has been altered.

source
Sort:hotnewtop