Company
Date Published
Author
Kristóf Muhi
Word count
815
Language
English
Hacker News points
None

Summary

Many streaming companies use Player SDKs to protect their content from illegal activities, which often have built-in protections such as detecting root/jailbreak, repackaging, code injection, and screen recording tools. However, these SDKs can be challenging to test on devices where screen recording or screen grabbing is enabled, requiring the creation of a separate QA/TEST build target with lowered security restrictions. To overcome this issue, streaming companies can create new builds targeting lower-security settings in their Player SDKs, which allows them to bypass screenshot detection and view protected content on Android devices. By using these workarounds, streaming companies can test their DRM protection efficiently and thoroughly, reducing the risk of bugs or issues that may arise on specific device and OS combinations.