Description: https://www.defcon.org/images/defcon-16/dc16-presentations/dc-16-newger.pdf https://www.defcon.org/images/defcon-16/dc16-presentations/newger/defcon-16-newger-wp.pdf In order to prevent music from being copied among consumers, content providers often use DRM systems to protect their music files. This talk describes the approach taken while analysing a DRM system (whose identity needs to be kept secret due to legal issues). It is shown what techniques were used to protect the system from being easily reverse engineered. This is not about how to hack . No decryption tools or information on how to write one will be released.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 16 , Defcon 16 , dc-16 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.