Hey, I finally learned how to break widevine and managed to get some drm content decrypted. I did this woth tubi which was relatively easy. So, Next I would like to embark on the adventure of decrypting some paid streamings, esp. D1sn3y and H8O M1X. any tutorials on that? From what I tried, the process is not as simple as with tubi (maybe because tubi is mkre straightforwaed and free?). Anyway, Im eager to learn and would be grateful of any good guide on that. 🏴‍☠️

Edit: Okay, since I grasped bascics, now its getting easier and I managed to download some content from D1sn3y using N_m3u8DL-RE but only in 720p. Is it possible to get it in 1080p?

  • VitabytesDev@feddit.nl
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    10 days ago

    I have heard about a TamperMonkey userscript called EMELogger that logs some information about EME, in the web tools console making it easier to get the PSSH. I haven’t tried it though.

    Also, I don’t think you will find guides on paid content as this is considered highly illegal (I think).

    • tommy@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      10 days ago

      I dont have issues with getting pssh or lic url - I got it already. But im in a situation in which i possesse decrypting key of content and need the content itself - in highest quality ofc. I fully understand why there are not a lot of guides for those - maybe some vip will pm me and give me some instructions tho.

      • VitabytesDev@feddit.nl
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 days ago

        Oh, I missed the L1 in the title. Basically, all the decryption at L1 is happening inside a Trusted Execution Environment. This is a dedicated chip that does all encryption-decryption (among other things). This is why it is so difficult to extract the keys, because they don’t enter the CPU or are stored in RAM, because the dedicated chip handles all of these.

        So I don’t think you can find a guide about this, because if anyone has found even one exploit, they would be keeping it to ourselves, so that it doesn’t get patched.

        Although it is very difficult, I think the only real solution is to reverse engineer a TEE and find an exploit yourself.

        If you manage to do this, please let me know! I am happy to get updates about progress in this topic.