*I'm not asking for piracy, I'm only wondering theoretically*
How is a protected path possible on a user's own machine? A key to decrypt content has to be somewhere on user's machine so why can't it be accessed?
For example the first picture on page 2 shows blu-ray protected path:
http://www.anandtech.com/show/2622/2
In the diagram, the application decrypts from aacs and then encrypts to aes. The work is being done by cpu, so doesn't the key have to be stored somewhere on cpu cache or ram?
1. cpu method.
Can't some secondary program be running to dump every calculation cpu does? Is it not possible to look inside what cpu is doing?
2. ram method.
Or if approached through ram, use compressed air trick to dump ram contents like this:
http://www.zdnet.com/blog/security/cryogenically-frozen-ram-bypasses-all-disk-encryption-methods/900
How is a protected path possible on a user's own machine? A key to decrypt content has to be somewhere on user's machine so why can't it be accessed?
For example the first picture on page 2 shows blu-ray protected path:
http://www.anandtech.com/show/2622/2
In the diagram, the application decrypts from aacs and then encrypts to aes. The work is being done by cpu, so doesn't the key have to be stored somewhere on cpu cache or ram?
1. cpu method.
Can't some secondary program be running to dump every calculation cpu does? Is it not possible to look inside what cpu is doing?
2. ram method.
Or if approached through ram, use compressed air trick to dump ram contents like this:
http://www.zdnet.com/blog/security/cryogenically-frozen-ram-bypasses-all-disk-encryption-methods/900