HDMI HDCP hacking

HDMI uses copy protection system called HDCP. And I have know for some years that HDMI copy protection broken. But based on recent information that has popped out it seems that it is even more broken that I thought that it was. Hackaday tells that HDMI breakout lets you sniff HDCP crypto keys and points to HDCP is dead. Long live HDCP. A peek into the curious world of HDMI copy protection… article for more details.


HDCP is dead. Long live HDCP. A peek into the curious world of HDMI copy protection… is interesting reading. It says that HDCP is thoroughly, comprehensively, irredeemably and very publicly broken. Normally, if something is this badly broken, particularly in the security world, at least some effort will be made to replace it with something that actually works. But still HDCP is pushed to users (because HDCP, although broken, cannot and will not be defeated by the general public).

The article has lost of interesting details to prove that HDCP is broken. The article shows how easy it is to exploit the vulnerabilities. Basically you just need a HDMI breakout cable (which is quite easy to build) and suitable logic analyzer to look at the data. HDCP key exchange is done over the DDC (Display Data Channel) that is basically an I2C serial bus, living on pins 15 (clock) & 16 (data) with ground on pin 17. A hdmi-sniff HDMI DDC (I2C) inspection tool tool can be found on the Aperture Labs tools page (it works with Bus Pirate).


  1. HDMI and ground loops « Tomi Engdahl’s ePanorama blog says:

    [...] Tomi Engdahl’s ePanorama blog All about electronics « HDMI HDCP hacking [...]

  2. Tomi Engdahl says:

    Ernesto / TorrentFreak:
    Intel, Warner Bros. sue LegendSky, a Chinese maker of HDFury devices that allow users to pirate 4K streams by stripping HDCP encryption

    Warner Bros and Intel Sue 4k Content Protection “Stripper”
    By Ernesto on January 4, 2016
    C: 109

    Warner Bros. and Intel’s daughter company Digital Content Protection have sued a hardware manufacturer that creates devices enabling consumers to bypass 4K copy protection. The devices, sold under the HDFury brand, can be used by pirates to copy 4k video from streaming platforms as well as other HDCP 2.2 protected content.

    Last November several pirated copies of 4K videos started to leak from both Netflix and Amazon. These leaks were unusual as online 4k streams were always well protected against pirates.

    While it’s still not clear how these videos were copied, a new lawsuit from Warner Bros. and Intel’s daughter company Digital Content Protection (DCP) suggests that HDFury devices may be involved.

    The companies have filed a lawsuit at a federal court in New York against the maker of the devices, technology company LegendSky.

    Starting a few weeks ago the Chinese company launched a range of new devices which allow users to strip the latest HDCP encryption. This hardware sits between a HDCP-compliant source device and another device, allowing it to pass on a “stripped” 4K signal.



Leave a Comment

Your email address will not be published. Required fields are marked *