(thanks for interesting answer) I have read infos that say that audio and video drivers will be in the trusted chain. If your hardware system is used by an os (i.e. win) on which you can't create drivers, and only industry signed drivers can be used you can't bypass this by hacking drivers ... My though is the hardware drm can be reverse engineered ? If you use cert on your DRM you must put cert and private keys on your DRM chip ... So you have somewhere memory (rom or else) where you have this private and cert datas. So with good tools you can read what are the bits in this DRM. So you can make a "soft drm" that use all the instructions of the reverse engineered hard drm, you but the reverse engineered private key, certs on your soft drm. All this goes on a "emulated" drm part on your os emulator. So booting the os believe that it is hard, because all instructions are the same, certs is the same, and private key can be used by your soft drm to en/crypt drm files ...??? We see that with time almost all can be reverse engineered, can it be the same with hard drm systems ?? (so seems happy futur, something you buy and use but don't own ?) Le mercredi 01 juin 2005 ` 18:09 -0400, Adam Back a icrit :
[could you use CPU emulator to bypass these motherboard and CPU based DRM systems].
Answer: no. They have but private keys inside the DRM hardware, and signed the corresponding public key with a CA that they control. That plus some hashing/bootstrapping etc of the startup and some other code allows them to ensure that an emulated version of the same software could not provide a valid signature + cert that a DRM content provider would accept.
They also have models where the video card and/or monitor are in the trust model -- and there are secured high bandwidth channels between DRM provider and CPU, and CPU and graphics card/decoder.
There is also a model for software called "Trusted Agents" that actually run on your CPU but are in a ring -1 (below ring 0) that you can not debug.
Another possibility is read the stuff out of RAM or video RAM. Midterm they can fix that also with on the fly RAM encrypt/decrypt.
But I still say it's futile and stupid, because people will hack the digital display, tap into the graphics card, hack video card drivers etc and re-encode. (Rip-once copy anywhere). Worst case people will A2D from the display "telesync" style.
Adam
-- "Perhaps one day "computer science" will, like Yugoslavia, get broken up into its component parts. That might be a good thing. Especially if it meant independence for my native land, hacking." (hackers and Painters) [ Paul Graham ]