Re: hardware access
Fair comment, you do need to think about hidden channels (or intended ones as Kiwi suggests). But that's a different situation than merely having management supervisors or software infrastructure phoning home on the internet.
This is not the situation that encrypted video links was designed for : trying to prevent someone with physical access to the equipment from reading the digital stream.
It's a much more interesting problem : when YOU have physical control of the hardware, can you prevent something deeply embedded in the hardware from leaking YOUR information back to a nefarious eavesdropper. Using some anti-copying tech as part of that is just an ironical side issue, despite what some people (downvotes ? really ?) think. I'd be downvoting DRM too - that's absolutely not the point.