Hacker News new | past | comments | ask | show | jobs | submit login

I'm assuming the keys are embedded before it's leaked like a watermark of sorts. The leaker isn't the pirate in the scenario described _I think_.



Ah! I read the references to pirates as referring to the person sharing the file online from an original source. But someone just torrenting it or something makes a lot more sense as the target here.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: