Featured post
ios - HTTP live streaming with encryption -
i trying understand how http live streaming protocol apple supports on ios devices on safari protects key unlocks content.
the way understand it, .m3u8 file holds whole thing , references content (in mpeg2 ts container, aes 128 encrypted) , key ts file.
like in example:
#extm3u #ext-x-media-sequence:7794 #ext-x-targetduration:15 #ext-x-key:method=aes-128,uri="https://priv.example.com/key.php?r=52" #extinf:15, http://media.example.com/filesequence52-1.ts #extinf:15, http://media.example.com/filesequence52-2.ts #extinf:15, http://media.example.com/filesequence52-3.ts #ext-x-key:method=aes-128,uri="https://priv.example.com/key.php?r=53" #extinf:15, http://media.example.com/filesequence53-1.ts
assuming browser based playback <video>
element fed m3u8 file in "src" attribute. in case, if key delivered via https, how can make sure user not enter https url in browser , saves key hard drive? way understand mechanism, key download done <video>
tag plays m3u8 source using browser's https stack -- how legitimate client inside browser distinguished user typing address bar? must obvious, don't see it...
all best,
dansch
how can make sure user not enter https url in browser , saves key hard drive?
you can have ssl client key/certificate in app, , thereby authenticate "the app" playing content. you'd avoid leaking content other devices app.
but mean you'd need somehow hide ssl-key/passphrase inside app. , there unfortunately problems getting video player on ios use ssl key authentication...
- Get link
- X
- Other Apps
Comments
Post a Comment