Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's only hard if an adversarial relationship is making it hard, which is exactly the case for DRM implementations. If you're writing code that runs in a trusted environment, then it is as simple as enabling decryption conditional on checking the display. That's only appears because trusted environments are nice simple places where code, file checks, system calls, CPU instructions, and all the other niceties work as intended.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: