• Taleya@aussie.zone
    link
    fedilink
    English
    arrow-up
    6
    ·
    12 hours ago

    Mate, digital cinema uses this encryption /decryption method for KDMs.

    The keys are tied into multiple physical hardware ids, many of which (such as player/.projector ) are also married cryptographically. Any deviation along a massive chain and you get no content.

    Those playback keys are produced from DKDMs that are insanely tightly controlled. The DKDM production itself even more so.

    And that’s just to play a movie. This is proven tech, decades old. You’re not gonna break it with premiere.

    • Valmond@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      5 hours ago

      This is for restricting use, not proving authenticity of the videos recording. Anyone can spin up keys and sign videos, so in a legal battle it would be worthless.

      • Taleya@aussie.zone
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        42 minutes ago

        The technology would be extremely easy to adapt, with the certs being tied to the original recording equipment hardware. Given i don’t see a $60 ip cam having a dolphin board it would probably be relegated to much higer end equipment, but any modification with a new key would break the chain of veracity

        • Valmond@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          3 hours ago

          This is blatantly not true, it would be extremely simple to circumvent. How do you “tie” the cert to a specific hardware without trusting manufacturers? You just can’t, it’s like putting a padlock on a pizzabox.

          • Taleya@aussie.zone
            link
            fedilink
            English
            arrow-up
            1
            ·
            42 minutes ago

            I literally explained earlier how this exact technology is used in digital cinema dude c’mon.

    • tweeks@feddit.nl
      link
      fedilink
      arrow-up
      3
      ·
      6 hours ago

      But how would one simple member of the audience easily determine if this whole chain of events is valid, when they don’t even get how it works or what to look out for?

      You’d have to have a public key of trusted sources that people automatically check with their browser, but all the steps in between need to be trusted too. I can imagine it is too much of a hassle for most.

      But then again, that has always been the case for most.