Go to the content

FGR*

Full screen

FGR* Blog

Aprile 3, 2011 21:00 , by Unknown - | No one following this article yet.

A Bug in Chrome Makes It Easy to Pirate Movies

Giugno 24, 2016 12:42, by FGR* Blog

For years Hollywood has waged a war on piracy, using digital rights management technologies to fight bootleggers who illegally copy movies and distribute them. For just as long, hackers have found ways to bypass these protections. Now two security researchers have found a new way, using a vulnerability in the system Google uses to stream media through its Chrome browser. They say people could exploit the flaw to save illegal copies of movies they stream on Chrome using sites like Netflix or Amazon Prime.

David Livshits from the Cyber Security Research Center at Ben-Gurion University in Israel and Alexandra Mikityuk with Telekom Innovation Laboratories in Berlin, Germany, alerted Google to the problem on May 24th, but Google has yet to issue a patch. The vulnerability exists in the way Google implements the Widevine EME/CDM technology that Chrome uses to stream encrypted video. The researchers created a proof-of-concept executable file that easily exploits the vulnerability, and produced a brief video to demonstrate it in action.

DRM Hole

The problem is with the implementation of a digital management system called Widevine, which Google owns but did not create. It uses encrypted media extensions to allow the content decryption module in your browser to communicate with the content protection systems of Netflix and other streaming services to deliver their encrypted movies to you. EME handles the key or license exchange between the protection systems of content providers and a CDM component in your browser. When you choose a protected movie to play, the CDM sends a license request to the provider through the EME interface and receives a license in return, which allows the CDM to decrypt the video and send it to your browser player to stream the decrypted content.

A good DRM system should protect that decrypted data and only let you stream the content in your browser, but Google’s system lets you copy it as it streams. The point at which you can hijack the decrypted movie is right after the CDM decrypts the film and is passing it to the player for streaming.

The researchers say the bug is very simple but won’t reveal details about it until at least 90 days after their disclosure to Google, since they don’t want to provide anyone who doesn’t already know about the vulnerability with information that would allow them to steal movies. Ninety days is the minimum that Google’s own security researchers in its Project Zero project give vendors to fix vulnerabilities they uncover before they disclose the bugs publicly.

Livshits and Mikityuk believe the issue can be fixed easily with a Chrome patch. But if Google wants to fix the issue and also mitigate against future vulnerabilities that might be uncovered in its Widevine DRM system, it would need to design the CDM so that it runs inside what’s called a Trusted Execution Environment or TEE. The TEE would act like a protective tunnel so that the decrypted content is written to a protected memory space, preventing someone from hijacking the content as it’s going to the player.

Asked about the vulnerability, a Google spokesman told WIRED that they’re examining the issue closely, but he also downplayed the bug, saying the problem is not exclusive to Chrome and could apply to any browser created from Chromium, the open-source code from which Chrome is derived.

“Chrome has long been an open-source project and developers have been able to create their own versions of the browser that, for example, may use a different CDM or include modified CDM rendering paths,” the spokesman wrote WIRED in an email.

What he meant is that the hijacking problem has long been known and that even if Google were to add code that forces the CDM to operate in a different way, other browsers that developers might compile from the Chromium could eliminate this code, leaving streaming content just as vulnerable and therefore not solving the problem of content hijacking.

The lab researchers say Google’s response is baffling. Just because other developers could produce a different browser that doesn’t incorporate more secure measures, doesn’t mean Google shouldn’t fix the problem in its own Chrome browser.

“[A] vulnerability in the product of Google which is distributed by Google, and users and [movie] studios expect to be secure, should be highly prioritized and fixed to prevent theft of protected content,” says Dudu Mimran, CTO of the lab in Israel where one of the researchers works.

Livshits and Mikityuk found the bug about eight months ago. It’s apparently existed ever since Google embedded the Widevine technology in its browser, though it’s not clear when that occurred. “The way the vulnerability works, it makes sense that it existed from the early days,” says Mimran. The tech giant acquired Widevine in 2010 to secure Chrome streams and premium YouTube channels. Widevine is also embedded in more than 2 billion devices that play protected content, according to its web site.

Firefox and Opera also use the Widevine CDM, though the researchers haven’t examined those browsers yet. They limited their research to the desktop version of Chrome. Neither Safari nor Internet Explorer use Widevine. Safari uses Apple’s FairPlay CDM, and Microsoft’s Internet Explorer and Edge browsers use Microsoft’s PlayReady CDM. The researchers haven’t examined those CDMs yet.

It’s not the first time flaws have been uncovered in a digital rights management system. In 2001 Russian programmer Dmitry Sklyarov discovered vulnerabilities in the encryption system Adobe used for protecting electronic books produced with Adobe Acrobat. That same year a group of researchers found flaws in the digital watermarking technology created by the Secure Digital Music Initiative, a consortium of recording companies and consumer electronics firms, to thwart piracy.

But the Chrome vulnerability is different in that it involves a third-party system that streamers are trusting to protect their valuable content.

“The simplicity of stealing protected content with our approach poses a serious risk for Hollywood [studios] which rely on such technologies to protect their assets,” Livshits says. Though the researchers have no way of knowing if this hole has been used in the real world, it shows that the battle to fight piracy continues on ever shifting territory.

Go Back to Top. Skip To: Start of Article.


Source link

Olympia Heights: Lightning Rod (The Olympia Heights Comic Book 1) (English Edition)

Giugno 24, 2016 12:27, by FGR* Blog



Compre agora!


When Zach Jacobs is struck by lightning on the football field, things start to get strange. Now a local girl is missing, and Zach knows more than he is letting on.

The Olympia Heights comic is an alternate-universe reboot of the Olympia Heights novel series, which follows a group of Florida teens who find out that they ARE the Greek Gods reborn. It features full-color stories with amphora-style flashbacks to the Ancient Greek myths.



São apenas negócios, minimiza Larry Ellison, sobre litígio com HP

Giugno 24, 2016 11:16, by FGR* Blog


Larry Ellison foi ao júri na quarta-feira (22/06) prestar depoimento no processo movido pela HP, que alega prejuízos causados pela descontinuidade de atualizações do banco de dados Oracle aos chips Itanium.

“São apenas negócios”, minimizou o executivo. Ele afirmou que a decisão de parar de investir na tecnologia  vinculou-se ao fato de que a própria Intel, fabricante dos processadores, já havia revelado descontinuidade das linhas.

O julgamento é a continuação de uma batalha judicial que se arrasta por quatro anos. A HP cobra US$ 3 bilhões da Oracle. Segundo a companhia, o fim do suporte prejudicou suas vendas de servidores.

O fim do suporte teria causado um grande impacto nas vendas do sistema. Segundo a companhia de hardware, o prejuízo causado até agora seria da ordem de US$ 1,7 bilhão. Além disso, a empresa projeta perder mais US$ 1,3 bilhão em vendas no futuro.


Fonte

Desenvolvedor PowerBuilder

Giugno 24, 2016 8:47, by FGR* Blog

Desenvolvedor PowerBuilder

IVIA

– Postado por temonteiro

| 24 jun 2016

Condomínio do Shopping Center Iguatemi – Av. Washington Soares, 85 – Edson Queiroz, Fortaleza – CE, 60811-900, Brasil

Emprego



IVIA-logo

Descrição da Vaga

ivia-power-builder

Relacionado

Como aplicar

Candidatos devem enviar o currículo atualizado para jobs-ce@ivia.com.br com o assunto [DEV POWERBUILDER]

Relacionado

Job Categories: Free.
Job Types: Emprego.
Job Tags: desenvolvedor e powerbuilder.
Job Salaries: Não informado.
Vaga expira em 5 days


Você deve fazer login ou criar uma conta, a fim de enviar uma vaga


Fonte

Stunning New Final Fantasy 15 Screenshots Show Delicious Food, Fantastical Beasts, Cool Weapons

Giugno 24, 2016 8:45, by FGR* Blog

Square Enix has released a fresh batch of screenshots for Final Fantasy 15, showing off a rather large range of weapons, the strange wild monsters players will encounter, and the game’s characters in battle.


Click image to view in full screen Gallery image 1Gallery image 2Gallery image 3Gallery image 4Gallery image 5Gallery image 6Gallery image 7Gallery image 8Gallery image 9Gallery image 10Gallery image 11Gallery image 12Gallery image 13Gallery image 14Gallery image 15Gallery image 16Gallery image 17Gallery image 18Gallery image 19Gallery image 20 Gallery image 1Gallery image 2Gallery image 3Gallery image 4Gallery image 5Gallery image 6Gallery image 7Gallery image 8Gallery image 9Gallery image 10

The weapons featured in the screenshots include a giant shuriken, a greatsword, a regal-looking shield, small daggers, and large spears. Of course, we also get to see protagonist Noctis using magic. More specifically, he’s setting things on fire by shooting flames out of his hands, which is pretty cool.

Outside of battle, we get to see the the gang riding around in their car, gathered around a roaring fire, and chilling out in a diner. The pictures can be found in the gallery above.

Final Fantasy 15’s release date has been confirmed as September 30, 2016. It will be available on PlayStation 4 and Xbox One. Although there hasn’t been an official announcement of a PC version, references to Steam and Windows 10 versions have been found.

More recently, director Hajime Tabata said Square Enix is “thinking about a PC version.” As he’s said before, fans should not expect this version to launch alongside the console editions in September, if it happens at all.


Source link

Desenvolvimento De Aplicativos Para Windows Phone

Giugno 24, 2016 8:26, by FGR* Blog



Compre agora!

R$ 34,19



Perfect Hotkey 1.32

Giugno 24, 2016 7:16, by FGR* Blog

Perfect Hotkey will help to create and maintain a list of your hotkeys easily. You can customize hotkey categories and set which command goes with each hotkey. Some of them are internal Perfect Hotkey commands and the rest are Windows commands. The program will help you to manage repetitive tasks on your PC with high speed and minimal effort.

Why is it faster? Usually you open a program by clicking on the Start menu button, then clicking on All Programs. Your eyes search for the program icon, then you must click on it and only then the program will be launched. With Perfect Hotkey launching programs will take less time than usually.


Source link

Sonda IT passa a ofertar soluções Lenovo à vertical de Governo

Giugno 24, 2016 7:14, by FGR* Blog


A integração dos portfólios da Sonda IT e da CTIS, adquirida pela chilena em 2014, respinga nas ofertas de produtos Lenovo. O processo união das operações deve reforçar a oferta de soluções da fabricante chinesa para o segmento governamental.

Além da aliança já consolidada com a provedora de hardware no Chile, que foi reafirmada no Brasil há um ano, a parceria local visa penetrar num setor que responde por aproximadamente 40% dos investimentos em tecnologia no País.

“Desde o último ano, quando anunciamos a aproximação com a Lenovo, fortalecemos nossa oferta da área de MDS (Managed Device Services), que leva às empresas um pacote de serviços atrelados aos hardwares da fabricante. Agora reforçaremos este modelo nas estatais”, explica Eduardo Borba, presidente da Sonda integradora.

A oferta envolve 100% do portfólio de soluções da chinesa, tais como notebooks, tablets, desktops, servers e workstations.

“Com a estrutura da Sonda, que conta com mais de 1 mil clientes na carteira, temos a capacidade de trabalhar em conjunto para melhor atender as demandas de nossos clientes atuais e futuros”, estima Augusto Rosa, diretor de canais da Lenovo no Brasil.


Fonte

Analista de Suporte II Nível

Giugno 24, 2016 4:45, by FGR* Blog

Analista de Suporte II Nível

Avant Software
– Postado por avantsoftware

| 23 jun 2016

R. Lídia Brígido, 55 – Parque Manibura, Fortaleza – CE, 60821-800, Brasil

Emprego



MARCA - AVANT-05

Descrição da Vaga

Descrição da Vaga

A Avant está selecionando um profissional para o cargo para Analista de Suporte (1 vaga) com experiência comprovada nas áreas de suporte, infraestrutura ou desenvolvimento.

A vaga é para atuação em suporte 2 nível em sistemas internos do nosso cliente, então precisamos de um profissional que tenha experiência em análise técnica de problemas envolvendo aplicações web e da estrutura que envolve o seu funcionamento.

Requisitos obrigatórios 

– Sólidos conhecimentos em banco de dados Mysql e SQL Server.
– Experiência de no mínimo dois anos em Analise de Sistemas.
– Experiência de desenvolvimento utilizando PHP.
– Sólidos conhecimentos em Orientação a Objetos e Design Pattern.
– HTML, CSS, Javascript, Ajax e JQuery.
– Ter cursado recentemente a Faculdade de Análise e Desenvolvimento de Sistemas ou relacionados.

Desejável

– Conhecimento em ferramenta de Versionamento (GIT, SVN)
– Conhecimento em processos de desenvolvimento Ágil
– Apache (Configuração e Manutenção)
– Linux (Distribuições OpenSuse e Debian)
– Jira (Administração e Manutenção).

Diferencial

– Certificação LPI 101 ou 102.

Vaga de emprego (regime de CLT)

– Carga horária: 44h semanais.

 

Relacionado

Como aplicar

Enviar currículos para rh@gsd.com.br

Relacionado

Job Categories: Destaque.
Job Types: Emprego.
Job Salaries: Não Divulgado.
Vaga expira em 4 days


Você deve fazer login ou criar uma conta, a fim de enviar uma vaga


Fonte

Combo Infinito TV #EP 12: Independence Day: O Ressurgimento

Giugno 24, 2016 4:44, by FGR* Blog

Sejam bem vindos queridos leitores/ouvintes/amigos do Combo Infinito. É com imenso prazer que apresentamos mais um Episódio do Combo Infinito TV, no nosso canal no Youtube.

Hoje falaremos sobre uma sequência de um dos filmes que marcaram a época dos blockbusters dos anos 90 – Independence Day: O Ressurgimento. Confira aqui quais os pontos positivos e negativos desse longa, se é fiel a continuação do filme de 1996, como a humanidade se comportou após 20 anos daqueles acontecimentos e muito mais.

Ariel e Alepitecus ainda esbanjam conhecimento de nomes dos personagens e conseguem comparar a estrutura de roteiro do filme a uma festa junina.

BEM VINDOS AO 12º EPISÓDIO DO COMBO INFINITO TV! Esperamos que gostem! E não deixe de se inscrever em nosso canal do Youtube pra assistir aos vídeos antes de todo mundo! o/


Source link