![](https://radiation.party/pictrs/image/141f2b46-3cf2-43be-aa47-13d675abc438.png)
![](https://lemmy.dbzer0.com/pictrs/image/a18b0c69-23c9-4b2a-b8e0-3aca0172390d.png)
Cinavia! Allegedly it’s still around and mandated in all consumer Blu-ray players.
Cinavia! Allegedly it’s still around and mandated in all consumer Blu-ray players.
I used Apollo and Relay extensively and not having those makes it so hard to even try for me.
Looks like beeper got their stuff working again.
Can’t imagine this working out very well long term though
It’s feasible and has been used in various 0day exploits in the last few years. It’s getting significantly rarer nowadays but media player exploits leading to RCE has been a staple of malware distribution for a long while.
It’s just much easier to make a malicious word macro and hope the user isn’t careful than to research/identify an exploitable bug in a media player.
Generally you can’t reverse it into exactly what was written, but most of the time you can disassemble or decompile just about any program as long as the binary format is known. The legibility of the resulting unraveling may vary depending on language and any methods used to obfuscate the end binary.
Massgrave is a tool that can create legit (oem) keys for windows and office out of thin air*