logoalt Hacker News

GenerWorkyesterday at 5:06 PM2 repliesview on HN

I've been out of that scene for a long time, hasn't Netflix implemented a bunch of anti-piracy methods, or are people just recording HDMI/DisplayPort output and saving it?


Replies

GrayShadeyesterday at 5:08 PM

It's easier to torrent stuff than to get 4K in Netflix on Linux.

show 2 replies
lelandbateyyesterday at 5:40 PM

Reading around a bit, yes to Netflix adding anti-piracy measures, maybe to folks recording HDMI/DisplayPort.

Apparently, Netflix is using steganography/content watermarks in their 4k content itself to trace users who are pirating. This is from a totally unsourced Reddit thread[0] but they do reference a real company which claims to do this watermarking[1]. The claim is that in addition to Netflix requiring 4k content to be available only on platforms with Trusted Execution Environments[2], Netflix also encodes each ~10 second "chunk" of the video stream into at least 2 different versions: an Y and a Z version. Then, they serve each customer a unique series of chunks when that customer streams their content, e.g. YYZYZZZYZYYZYZYYZZYZYYZ. Then when content leaks, Netflix can examine each chunk of the leaked content to extract the ID of the user who streamed the content. Apparently, Netflix can encode a lot more than just the userID, they can also encode stuff like the individual device ID, the TEE key ID, etc.

I know you might be thinking "I could do something to defeat that" and you're probably right (e.g. take streams from multiple users and intercut them so that the bits of the watermark through time are being constantly shuffled), but I'll also bet that there's many layers of steganography we don't know about, and unless you get them all, you'll not escape scot-free.

[0] - https://www.reddit.com/r/Piracy/comments/1rqkyjg/with_a_lot_...

[1] - https://irdeto.com/video-entertainment/irdeto-anti-piracy

[2] - https://en.wikipedia.org/wiki/Trusted_execution_environment

show 4 replies