Blu-Ray Ultra-HD DRM: Difference between revisions
Bythmusters (talk | contribs) m Started cargo |
PeaceSeekers (talk | contribs) m archiving |
||
| Line 22: | Line 22: | ||
#A UHD-compatible optical drive certified by '''{{Wplink|AACS_LA|AACS LA}}'''. | #A UHD-compatible optical drive certified by '''{{Wplink|AACS_LA|AACS LA}}'''. | ||
#'''An Intel CPU with support for Intel Software Guard Extensions (SGX):''' SGX is a protocol that creates a secure environment to prevent users from tampering with imposed restrictions. This feature was available in Intel CPUs produced between 2015 and 2022 but was discontinued due to security concerns (list of vulnerabilities is available {{Wplink|Software_Guard_Extensions#List_of_SGX_vulnerabilities|here}}). | #'''An Intel CPU with support for Intel Software Guard Extensions (SGX):''' SGX is a protocol that creates a secure environment to prevent users from tampering with imposed restrictions. This feature was available in Intel CPUs produced between 2015 and 2022 but was discontinued due to security concerns (list of vulnerabilities is available {{Wplink|Software_Guard_Extensions#List_of_SGX_vulnerabilities|here}}). | ||
#'''Intel Management Engine (ME):'''<ref> | #'''Intel Management Engine (ME):'''<ref>{{cite web|url=https://www.fsf.org/blogs/sysadmin/the-management-engine-an-attack-on-computer-users-freedom|title=The Intel Management Engine: an attack on computer users' freedom|website=Free Software Foundation|access-date=2025-01-30|archive-url=https://web.archive.org/web/20250210165315/https://www.fsf.org/blogs/sysadmin/the-management-engine-an-attack-on-computer-users-freedom|archive-date=2025-02-10}}</ref> If the ME version is outdated, the disc will not play. | ||
#'''An Integrated Graphics Processing Unit (GPU):''' The GPU shares the SGX enclave with the CPU, reducing the likelihood of users accessing or copying audio/video data. | #'''An Integrated Graphics Processing Unit (GPU):''' The GPU shares the SGX enclave with the CPU, reducing the likelihood of users accessing or copying audio/video data. | ||
#'''HDCP 2.2 support:''' The integrated GPU, monitor, and HDMI/DisplayPort cable must all support '''{{Wplink|High-bandwidth_Digital_Content_Protection|High-bandwith Digital Content Protection}}''' (HDCP) version 2.2. This protection system authenticates devices and encrypts the stream between them, making it extremely difficult to access audio/video data. | #'''HDCP 2.2 support:''' The integrated GPU, monitor, and HDMI/DisplayPort cable must all support '''{{Wplink|High-bandwidth_Digital_Content_Protection|High-bandwith Digital Content Protection}}''' (HDCP) version 2.2. This protection system authenticates devices and encrypts the stream between them, making it extremely difficult to access audio/video data. | ||
| Line 29: | Line 29: | ||
The decryption process involves several steps, with the first being the authentication of the player and the optical drive to ensure that both possess valid certificates. These certificates can be revoked arbitrarily at any time by AACS LA, rendering devices or software unusable with restricted media. | The decryption process involves several steps, with the first being the authentication of the player and the optical drive to ensure that both possess valid certificates. These certificates can be revoked arbitrarily at any time by AACS LA, rendering devices or software unusable with restricted media. | ||
Developers can obtain specifications for AACS 2.0 and 2.1 only after signing a license agreement.<ref> | Developers can obtain specifications for AACS 2.0 and 2.1 only after signing a license agreement.<ref>{{cite web|url=https://aacsla.com/wp-content/uploads/2022/09/AACS1-Adopter-Agrmt-220519-v1.1-FINAL_review-only.pdf|title=AACS License Agreement|website=Advanced Access Content System|access-date=2025-01-30|archive-url=https://web.archive.org/web/20250406142710/https://aacsla.com/wp-content/uploads/2022/09/AACS1-Adopter-Agrmt-220519-v1.1-FINAL_review-only.pdf|archive-date=2025-04-06}}</ref> This agreement stipulates that any software implementation must be closed-source and, as stated in section 7.6.4.1 of the agreement, requires the use of obfuscation techniques designed to effectively disguise and hinder attempts to uncover the methods used. This raises privacy concerns because decryption keys cannot be included with the software. Instead, the software must connect to the internet to retrieve the keys from servers. If these servers were to shut down, there would be no way to obtain the decryption keys, making the discs permanently unplayable. | ||
==Ownership concerns== | ==Ownership concerns== | ||