2008-06-15, 18:24
Just to update those that haven't been following Beebhack...
Last week's update was a temporary fix - we were expecting there to be more "features" of the XOR encryption and there were. Programs are now encrypted with various different 2-byte patterns and sometimes have this pattern reversed at the end of the encrypted data, sometimes not.
A packet dump from a real iPod session is coming soon, but our expert perl hacker found a way to work out the key and the method just from the data file anyway
I'm sure johnsto will be able to port his findings into python fairly easily, but for the moment the method for watching iPlayer in XBMC is to run the get_iplayer download/decrypt client on a shared folder and just watch the video across the network.
These two pages are what you need:
http://beebhack.wikia.com/wiki/Programs
http://beebhack.wikia.com/wiki/IPhone_H.264_version
Last week's update was a temporary fix - we were expecting there to be more "features" of the XOR encryption and there were. Programs are now encrypted with various different 2-byte patterns and sometimes have this pattern reversed at the end of the encrypted data, sometimes not.
A packet dump from a real iPod session is coming soon, but our expert perl hacker found a way to work out the key and the method just from the data file anyway
I'm sure johnsto will be able to port his findings into python fairly easily, but for the moment the method for watching iPlayer in XBMC is to run the get_iplayer download/decrypt client on a shared folder and just watch the video across the network.
These two pages are what you need:
http://beebhack.wikia.com/wiki/Programs
http://beebhack.wikia.com/wiki/IPhone_H.264_version