BBC fixes hack loophole in iPlayer

BBC fixes hack loophole in iPlayer

Summary: A fix has been released for a loophole that allowed hackers to download content stripped of its DRM restrictions

SHARE:
TOPICS: Networking
2

The BBC has issued a fix for a loophole that allowed hackers to download unrestricted content from its iPlayer online TV service.

In a statement the BBC said it had released a fix for the "unrestricted downloading of streamed TV programmes".

Hackers have been exploiting the loophole to download content stripped of its digital-rights management (DRM) restrictions, which include the automatic deletion of downloaded programmes after 30 days.

The BBC statement added: "Like other broadcasters, the security of rights-protected content online is an issue we take very seriously. It's an ongoing, constant process and one which we will continue to monitor."

The download version of iPlayer was launched in beta form last summer before being joined by a streaming version when the service received its marketing launch on Christmas Day last year.

Read this

Feature

Special report: Anatomy of a hack attack

We recreate a typical attack on two large organisations

Read more

During the first seven weeks following its marketing launch, around 17 million programmes were streamed or downloaded from iPlayer.

iPlayer has attracted controversy, as the initial download version was only available for computers using Microsoft's Windows XP, and there were concerns the surge in downloads could potentially cripple broadband networks.

Topic: Networking

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

2 comments
Log in or register to join the discussion
  • I think not ...

    http://po-ru.com/diary/bbc-iplayer-fix-hacked-again/
    dogStar5000
  • Thanks for the heads up

    Hi dogstar,

    Thank you for alerting us to this hack. I spoke to developer Paul Battley, and he explained why and how he had written the code. The story is at http://news.zdnet.co.uk/security/0,1000000189,39366057,00.htm.

    Tom
    Tom Espiner