Quote:
Originally Posted by pdurrant
It is not that there are loopholes or errors in the programming of the DRM system. It is that the system is inherently insecure.
|
Perhaps, though I don't see loopholes as errors.
Being somewhat of a programmer myself, it seems to me there is really only two ways to get that key (or from what I have seen, one of many keys), and that is either by reverse engineering the app (if not obfuscated) or capturing (intercepting) the stream/command/handshake during decryption, much like they do with video DRM.
I guess the obvious third way would be insider knowledge, but that is a different fish.
P.S. It's not like Amazon coders are having to deal with the security of third party devices, everything goes through their app, not someone else's who they have given a key to. So any flaws or loopholes are theirs. Seems that way to me anyway, and though I ain't no encryption expert, I've had an interest in it for years and read a fair bit about it. Still, I could be wrong ... stranger things have happened.