Here's what I'm talking about. Medici TV sent me an advertising E-mail today. I get one
of those from them maybe 5 or more days a week. I don't mind them because they're just
telling me about classical music concerts that they are releasing on their site, & every
once in a while I do like to download what they offer & keep it. I wasn't all that
interested in today's offering, but here it is:
https://www.medici.tv/en/concerts/jonas-kaufmann-ludovic-tezier-baden-baden
When I sent Firefox to that page, it looked like what you can see in attached image #01.
I Side Downloaded the indicated variant on the VDH menu, as you can see in attached image
#02. The relevant information for the file is shown in attached image #03. As you can
see, it's a small file that took only 4 seconds to download. You won't be surprised to
learn that it played just fine, with both video & audio, all 36 seconds of it.
Now for the inside bits. Attached file Master-m3u8.txt is the HLS master manifest shown
in attached image #01 in the Network Monitor as file m.m3u8. You'll notice that every
EXT-X-STREAM-INF descriptor shows a URL that has the character strings AES & DRM in them.
The fact that I downloaded this clip with VDH is proof that it is not protected by DRM,
nor is it encrypted in any sort of secret way. Maybe it's encrypted in a public way. I
don't know. I'm not an encryption expert.
The attached file ffprobe Master.txt is the ffprobe report on the master manifest.
Nothing unusual about it. You'll notice that beginning at line 49 of this listing,
ffprobe begins reading the stream manifests. Each one of the stream manifests includes a
reference to a key file that ffprobe reads. Ffprobe then reads the first chunk of the
stream. Those are the URLs that end with -1.ts. That apparently is all ffprobe needs to
read in order to generate its report at the bottom of the listing. You can see ffprobe
reading 6 pairs of key/-1.ts objects. This matches up with the report at the bottom
where it describes Programs 0-5.
I then picked the sixth stream manifest reported by ffprobe. This is on line 48 of the
ffprobe listing for the master manifest. That stream manifest is in attached file
1920x1080-m3u8.txt. Note how there is a descriptor in there that begins:
EXT-X-KEY:METHOD=AES-128
It contains a URL that ends in .key & the strings drm & aes appear in the URL. This is a
road block for neither ffprobe not VDH. Nor would it be for ffmpeg if I had chosen to
download this stream that way, which I did not.
I put that stream manifest through ffprobe, which resulted in attached file
ffprobe Stream.txt. This is quite obviously what VDH used to download the file I
downloaded.
So I say again, the things Mitja shows in his HAR file are completely non-informative.
We need him to check whether his content is protected by DRM using the usual technique,
as I requested upthread here..