End-to-End Anti-Piracy
How Irdeto fights piracy
Content theft and leaks can happen at any point along the value chain.
Content protection systems and associated data must be continuously monitored to identify new attack vectors.
It is key to incorporate innovative technology to address the challenges presented by the ever-evolving piracy landscape.
What is pirated?
Production
- Pre-Release Content
- Short Clips
- Dailies for film or tv eps
- Set pictures
- Plot Spoilers
Distribution
- Trailers
- Short Clips
- Full film or tv eps
- Live Broadcast/Sports
Delivery
- Full film or tv eps
- Live Broadcasts/Sports
Consumption
- Full film or tv eps
- Live Broadcasts/Sports
How is content leaked or stolen?
Production
- Hacking of Production Cloud
- Theft of Employee Credentials
- Employee Leaks or Theft
Distribution
- Intentional (or unintentional) early release of content
- Hacking of distributor/operator
- Distributor or operator employee leaks
Delivery
- CDN token sharing
- Session ID Sharing
- Key distribution hacking
- Device cloning/hacking
- Credential Stuffing
Consumption
- HDMI rips
- CDN hacks
- Screen record/capture
- Credential Theft & Sharing
- Circumvent geo-blocking
- Sharing via social media
What can be done to protect content and deter piracy?
Production
- Utilize a security investigations solution for platform assessments
- Embed a forensic watermark to identify source of leak
- Utilize an antipiracy solution to continuously find & report/enforce leaks
Distribution
- Utilize a security investigations solution for platform assessments
- Embed a forensic watermark to pinpoint security weaknesses
- Utilize an antipiracy solution to continuously find & report/enforce leaks
Delivery
- Generate keys for content encryption and administer content usage rules with Digital Rights Management (DRM) or multi-DRM
- Concurrent stream management
- Embed a forensic watermark to identify the subscriber
- CDN access revocation
Consumption
- Utilize session token authentication
- Geo-blocking by country; automatic VPN & proxy detection
- Concurrent stream management
- Embed a forensic watermark to identify subscriber/broadcaster to immediately disrupt pirated streams
- Fingerprint content for rapid discovery, validation & removal of piracy