![]() There's a whole industry built around these "weak points" (google "stream ripping" to see for yourself). Unless you can somehow eliminate each and every of those (good luck with the last one), all you can do is make the data capture/transform more complex. Your video can be intercepted (and/or modified) at every point marked with * (although quality of the copy may decrease, esp. *the images are displayed on the screen (at which point they exit the computer in form of light).*the images flow through a cable into the screen.*the display system transforms the images into a format the screen understands.*the player sends the images to the OS's display subsystem, or saves it to disk.*the player transforms the data into a sequence of images (a.k.a.*the OS passes the data to the app that requested it."this is a data packet, from $yourserver to me, and should be passed on to $yourapp") *the OS handles the lower data layers (i.e.*the data comes through the network into the computer (although capturing the data at this stage is more practical for the NSA than for a user).(this, also by definition, means, that the user's computer is "downloading" the data).the server, if it decides that it's a legitimate player, begins sending data to the user's computer.(this, by definition, requires that the request goes through the whatever networking stack the user's computer has).the player sends a request through the network "send me teh videos" to your server.the click goes through the computer's OS to your player.the user clicks the mouse on your player's "Play" button.but they must not be able to download that video" ![]() This is the common problem with copy protection: you are unable, by any means, to distinguish between a legitimate user and an adversary (as they may even be the same person).Įdit: re "my users can able to watch the video. ![]() As soon as you do, all bets are off (for less paranoid answer, see last paragraph). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |