it was only recently that many publishers even used unique DRM keys for media. they used to basically generate one private key blob and give the identical blob to people. now they're building systems with unique blobs that could be used to identify infringement and distribution back to an actual actor that facilitated the unlock of the original stream.

i threat model some of those systems. there are tons of ways to implement DRM and i avoid it whenever i can.

@waderoberts @mjg59 @pluralistic