• sugar_in_your_tea
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    5 months ago

    It’s possible, but with copy protections, it’s incredibly unlikely. You’d run an app on your computer or TV to decrypt and view the media, just like you do with Netflix or whatever.

    • lightnsfw@reddthat.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 months ago

      that wouldn’t stop someone from dropping a “media player” on the drive with your logo on it that’s actually malware. People unfamiliar with how it’s supposed to work would plug that in and run it without even thinking about it. I guess you could have the machine format the drive every time it comes back and have it test for counterfeits to prevent that though now that I think about it more.

      • sugar_in_your_tea
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        5 months ago

        I guess you could have the machine format the drive every time it comes back

        Yup, that’s the plan. You turn it in, it reimages it to whatever the next customer is likely to need, and if a customer asks for something out of left-field, it would reflash and take a bit longer.

        Flashing on return is essential because it checks whether the returned item is still in working order, so it really wouldn’t be an issue.

        • cestvrai@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          The USB port of the machine is also an attack vector.

          1. Infect the machine and reprogram it to infect every drive being flashed
          2. Hacked media would install Bitcoin miners on the victim’s “smart” TV
          3. ???
          4. Profit
          • sugar_in_your_tea
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            5 months ago

            Eh, I suppose, but they could design the USB drive really hard to infect. The more narrow your use-case, the more options you have to secure it.

            They could even limit it to just HDMI, which would probably be a lot harder to attack since HDMI doesn’t support much besides audio and video.