this post was submitted on 31 Oct 2023
133 points (100.0% liked)

Technology

37630 readers
267 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] jet@hackertalks.com 13 points 11 months ago (1 children)

Sponsor block demonstrates one approach to this. If everybody has the ad at the same time stamps, sponsor block would just work out of the box.

If they got creative and introduced different time stamps for the advertisements for different people, then we could do something like MD5 hash of different video payloads, and look for the MD5 hash that isn't distributed to everybody, mark that as an advertisement

[–] aksdb@feddit.de 3 points 11 months ago (2 children)

Theoretically they could deny serving byte ranges before the end-of-ad mark until those bytes have been served and a plausible time (the duration of the ad) has passed. Practically this is likely more expensive than what the ad revenue would yield.

[–] jet@hackertalks.com 3 points 11 months ago (1 children)

Sure, but then you just need a youtube front running cache that preloads videos, or load multiple videos at the same time... i know i'm not the only person who watches youtube at 3x speed, so you could speed up past the ad, etc.

[–] amju_wolf@pawb.social 1 points 11 months ago (1 children)

They could use stream encryption (DRM) to ensure you're viewing the ads as expected and make it hard to capture and playback.

[–] jet@hackertalks.com 5 points 11 months ago* (last edited 11 months ago) (1 children)

Its a arms race, you could always just record the screen with a camera and edit it out as the ultimate.

you could spin up a vm, and capture the video output

you could use a graphics driver that lets you inspect the frame buffer, etc

you could use the side channel attacks to get the decrypted video frames, heartbleed etc, etc etc

[–] amju_wolf@pawb.social 1 points 11 months ago (1 children)

Do these actually work against HDCP? (Outside using a camera, obviously). I know it used to work decently well against most "ordinary" attacks like VMs and capture cards.

[–] jet@hackertalks.com 1 points 11 months ago* (last edited 11 months ago)

I believe HDCP keys have already been leaked, I can find a couple different references to them on GitHub even.

[–] GissaMittJobb@lemmy.ml 1 points 11 months ago (1 children)

This would probably be unviable, since from a UX standpoint you want the first segments of the non-ad content to be preloaded when the ad ends.

[–] aksdb@feddit.de 3 points 11 months ago (1 children)

That will be irrelevant when the control freaks take over. Case in point: anti piracy ads in the good old DVD/BluRay days. Unskippable shit that ironically only punishes people who bought legitimate media.

[–] GissaMittJobb@lemmy.ml 1 points 11 months ago

I honestly think that the people at Google are a bit smarter than that, but we'll see whether that holds or not.