A peek into the curious world of HDMI copy protection… with the Bus Pirate
Adam Laurie (a/k/a/ Major Malfunction) is a white hat hacker from London, UK, who has presented at a number of conferences worldwide. He’s also the Director at Aperature Labs, Ltd. Recently he explored the broken HDCP security mechanism used in HDMI. After building the HDMI breakout cable pictured above he examined the cable’s data lines using a USBEE protocol analyzer and noted that the HDCP key exchange was sent using I2C. From here he turned to the Bus Pirate for filtering the I2C data. He explains, “So now we’ve got access to the raw data, we need to be able to filter what we’re looking for and decode it fully. It is possible to write custom decoders for the USBEE, but to be fair, this device falls outside my “cheap” criteria – I only wanted to use it as a quick check that the pins I’m looking at are the correct ones, and that we see the type of data we expect to see. The device I had in mind to do the actual decoding is an off-the-shelf tool that can read, write and sniff I2C: the Bus Pirate. It’s extremely cheap as well, so fits the bill perfectly…” Thanks, Adam!
You can read the details on Adam’s exploration of HDCP with the BP in Adam’s Blog at Aperature Labs.
Get an assembled Bus Pirate for $30, including world-wide shipping. Also available from our friendly distributors.
Via the contact form.This entry was posted in Bus Pirate, encryption, security and tagged HDCP, HDMI, sniffing.