ok, i call today the onlinelib hotline to understand how acp worked: i will try to explain ( i dont know if this was all was the true)
as i understand it right , acp has 3 protections: 1) the flv streams on the server are encrypted with an 64bit key during the stream the vcs streaming server decrypt it. i asked why this is needed and they say that this feature is for when someone hacks or got an ftp or ssh server account. the flv file that they rip are useless, ok make sence, or?! for decrypting they say that they use an pci-dsp card, but they dont say what kind of card. i dont believe that they have developed special hardware. are their encrypting card which anyone can buy?! 2) the DRM encoded flv files are splitted, that means they splitt the hole video in 4 parts and then swap the 4 parts vertical and horizontal. this is really funny, cause without re-encoding, re-cropping its not possilbe to view the stream. Did they have an own encoder for this?! but the question is , how they rebuild the video inside flash?! is this possible?! 3) they use personal client keys & image watermarks. for testing i request during the telephone call a DRM key: http://www.onlinelib.de/vcsdemos/drmdemo1/drmPlayer1.html ( wait the preview and then a dialog opens where you can request a DRM ticket ) After 20 Seconds i reconnect to the same url, and there bum - the hole video plays. After 3 min they say that they have disabled my client for viewing, i reconnect and the stream only played the preview. The Watermark part that they try to explain was to hard for me to understand. They have an image where someone can understand it better, can anyone explain it?! http://www.onlinelib.de/VCS/DRM/vcsDRMSheet1.gif Is there anything we can include in red5?! Best & thanks nick Dan Rossi schrieb: > Adobe are looking into DRM features at the moment, and I assume it would > be as you suggested. Encoding keyframes as they are being streamed out > and decoding on the player end, or files are packaged up with encoded > bits at keyframes and the flash player can decode them. I say to hell > with DRM but blocking annoying stream rippers would be a +. > > Mikko Rantalainen wrote: > >> Nick wrote: >> >> >> >>> After some hours of testing we tryed to rip the "DRM Video" from >>> Onlinelib ACP - Advanced or Anti Copy Protection >>> (what a stupid name,hehe) and here the reply media catcher doenst works. >>> >>> There was no chance to save onlinelib DRM Demo from: >>> http://www.onlinelib.de/vcsdemos/drmdemo1/drmPlayer1.html >>> >>> It seems that here is more as a "marketing air bubble" behind ACP from >>> onlinelib. >>> >>> Does anyone knows how they protect their Videos for ripping?! >>> >>> >> Without inspecting the traffic in any way I guess they could be using a >> technique similar to one used in encrypted DVB streams. If I've >> understood correctly, encrypted DVB stream is mostly without encryption. >> The only part that is encrypted is some pieces of every keyframe - just >> enough to break decoding of the whole stream. >> >> Perhaps flash player can download a partially corrupted (broken keyframe >> data) FLV from the server, download encrypted patch for broken FLV file >> from DRM-server, decrypt the patch and apply patch to the FLV on the fly >> before decoding the video? >> >> >> > > > _______________________________________________ > Red5 mailing list > [email protected] > http://osflash.org/mailman/listinfo/red5_osflash.org > > _______________________________________________ Red5 mailing list [email protected] http://osflash.org/mailman/listinfo/red5_osflash.org
