balamw said:
Finding where the keys are on your HDD is the easy part, accessing and using them is the task that takes months... [Simple way to find the location of the keys. Image your HDD. Purchase file from iTunes. Image your HDD compare the two images. The new key(s) (and the file itself) must be in the bits that changed.]
Sure. Of course, the guys working on DRM at Apple aren't idiots. If you were an engineer charged with defeating this type of attack, what would you do? I can tell you what I would do, I would start changing a whole load of bits on your harddrive, not because it's necessary, but because it makes it that much harder for you to find the stuff that changed.
It's a moot point anyway. Any file that you download from iTunes is going to be at least a few megs in size. The key is going to be somewhere in the order of a couple of hundred bytes. Which bytes amongst the several megs are the key? They aren't necessarily contiguous, they're almost certainly encrypted by another key hidden elsewhere in the system, and they may even be fiddled by a virtual machine after decryption, just to muddle things up a little bit more.
Finding the approximate location on the HD is simple. Fiding the actual key in the right order is an extremely difficult task.
balamw said:
As someone who does this for a living, can you comment on my read of the hacks that have been released in the later post
https://forums.macrumors.com/posts/2917258/. It still seems to me that where DRM has been hacked has relied on key retrieval or finding the weak spot in the chain.
B
Um, of course DRM hacks rely on either retrieving the key, or finding the weak link. They are the only two attacks possible - grab the data after the program has decrypted it for use, or find the key/algorithm so that you can do the decryption yourself. At the moment the first attack is nearly trivial to implement, although that will change a bit when the manufacturers start moving on to a "Trusted Computing" style platform. All you need to do is write your own audio driver that sits between the computer and the real driver. It picks of the data and stores it as it's sent to the speakers.
The second solution is much more difficult, but far more elegant. It allows you to keep intact all of the metadata associated with the file (track name, lyrics, album name etc etc). BUT, you have to be clever enough to recover the key.