The cryptography Apple uses to secure AirPlay wireless media streams - and to prevent anyone easily supporting the protocol for playback - has been cracked. Frustrated by the lack of a third-party AirPort Express simulator - APEx is Apple's mini access point-cum-media streaming terminal - coder James Laird opened one up and …
And let slip the lawyers of war.
With apologies to William Shakespeare.
Can't put the genie back
If the private key is in rom, and it has to be, then it will just be found again. It's another AACS, when are they going to learn?
Ah yes, but what will they learn?
A) That they need to have better security design and DRM
B) Make it "open", and more like webkit, and give up the arms race they will ultimately lose anyway
One will earn you a slap on the back, the other, just a slap. Try and guess which one Apple chooses!
I can't help thinking ...
I can't help thinking that the people who actually wrote the code that does all this stuff know that it's futile. Which leads one to ask why they did it in the first place, and at whose behest?
Could it possibly be the music and video publishing companies again? (Who, despite frequent counter-examples, still believe that copy protection is possible.)