Has anyone reverse engineered the Chromecast and how the apps that run on it work? What OS/API/framework do they use?
-
-
Replying to @RichFelker
I have a launch-day first-generation Chromecast that accidentally had the bootloader that would accept any image. What specifically do you want to know about it? AFAIK the tools for hacking on it _suck_ so not too much interesting has been done to it.
1 reply 0 retweets 0 likes -
Replying to @rqou_
Basically how to replicate it inside an emulator where the software will happily play (and with minor tweaks, write out) DRM'd content cast to it.
1 reply 0 retweets 0 likes -
Replying to @RichFelker
Hmm, you can try just shoving the filesystem into QEMU somehow but idk what will actually happen. AFAIK there's no real TrustZone/secure-enclave/remote-attestation stuff happening.
1 reply 0 retweets 0 likes -
Replying to @rqou_
Right, need to extract it to be able to do that though. The lack of hardware DRM enforcement is what makes it so attractive. They can't cut off this DRM-stripping vector without bricking millions of devices.
2 replies 0 retweets 0 likes -
Replying to @RichFelker
Sure, but AFAIK you'll be limited to 1080p. For maximum awesome, somebody should use the Skylake ME arbitrary code execution vulnerability to pwn PAVP and get decrypted 4K dumps. Oh and dump the SGX attestation key while they're at it.
1 reply 0 retweets 0 likes
I'm plenty happy wiith 1080p or even SD (DVD) as long as I have archival copies of things I paid DVD prices for.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.