Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
Retr0id
1y ago
0 comments
Share
But they don't control the playback stack, once the attacker has the keys. The attacker brings their own stack, decrypting the data with their own software.
0 comments
default
newest
oldest
jsheard
1y ago
That doesn't help the attacker if their key can only decrypt the subset of frames which Netflix wants them to be able to decrypt.
j
/
k
navigate · click thread line to collapse