Tue Nov 17 13:52:17 UTC 2009
really should look at the OCUR spec (freely available), as it
describes in detail how the encryption and key management works
between the headend and the OCUR device, as well as what requirements
are put on PC vendors interested in interfacing the OCUR device. The
requirements are specific enough to extrapolate at a high level what
would be required to meet those requirements.
It's an interesting read, if for no other reason as it gives you an
idea how they did give considerable thought as to how to
prevent/mitigate all the attack vectors that most security
professionals would come up with (at least they covered most of the
obvious attacks I thought of and I used to design high-security
encryption hardware for a living).
Devin J. Heitmueller - Kernel Labs
More information about the mythtv-users