Name: Anonymous 2015-09-30 22:53
1. All media is encrypted executable code. For example, there are not true videos published, but actual instructions for drawing an image on the screen. Programs are likewise encrypted. Those instructions are encrypted with a streaming cipher public-private key encryption scheme and are decrypted in hardware.
2. The chips in charge of decoding images use the mechanisms of Xerox's self-destructing chips. Any would-be reverse engineer will just end up having his shit blown up.
3. Each chip is etched with a unique number that it's keys are derived from. The media publisher operates a service that the client hardware contacts with it's request, telemetry data, and it's encryption key. The service stores the media in an intermediate form that allows for efficient watermarking and encryption.
Boom, no more piracy or ad blocking ever.
2. The chips in charge of decoding images use the mechanisms of Xerox's self-destructing chips. Any would-be reverse engineer will just end up having his shit blown up.
3. Each chip is etched with a unique number that it's keys are derived from. The media publisher operates a service that the client hardware contacts with it's request, telemetry data, and it's encryption key. The service stores the media in an intermediate form that allows for efficient watermarking and encryption.
Boom, no more piracy or ad blocking ever.