• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    13
    ·
    1 year ago

    Sponsor block demonstrates one approach to this. If everybody has the ad at the same time stamps, sponsor block would just work out of the box.

    If they got creative and introduced different time stamps for the advertisements for different people, then we could do something like MD5 hash of different video payloads, and look for the MD5 hash that isn’t distributed to everybody, mark that as an advertisement

    • aksdb@feddit.de
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      Theoretically they could deny serving byte ranges before the end-of-ad mark until those bytes have been served and a plausible time (the duration of the ad) has passed. Practically this is likely more expensive than what the ad revenue would yield.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        Sure, but then you just need a youtube front running cache that preloads videos, or load multiple videos at the same time… i know i’m not the only person who watches youtube at 3x speed, so you could speed up past the ad, etc.

        • Amju Wolf
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          They could use stream encryption (DRM) to ensure you’re viewing the ads as expected and make it hard to capture and playback.

          • jet@hackertalks.com
            link
            fedilink
            English
            arrow-up
            5
            ·
            edit-2
            1 year ago

            Its a arms race, you could always just record the screen with a camera and edit it out as the ultimate.

            you could spin up a vm, and capture the video output

            you could use a graphics driver that lets you inspect the frame buffer, etc

            you could use the side channel attacks to get the decrypted video frames, heartbleed etc, etc etc

            • Amju Wolf
              link
              fedilink
              arrow-up
              1
              ·
              1 year ago

              Do these actually work against HDCP? (Outside using a camera, obviously). I know it used to work decently well against most “ordinary” attacks like VMs and capture cards.

              • jet@hackertalks.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                1 year ago

                I believe HDCP keys have already been leaked, I can find a couple different references to them on GitHub even.

      • GissaMittJobb@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        This would probably be unviable, since from a UX standpoint you want the first segments of the non-ad content to be preloaded when the ad ends.

        • aksdb@feddit.de
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          That will be irrelevant when the control freaks take over. Case in point: anti piracy ads in the good old DVD/BluRay days. Unskippable shit that ironically only punishes people who bought legitimate media.

          • GissaMittJobb@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            I honestly think that the people at Google are a bit smarter than that, but we’ll see whether that holds or not.