[tdb_title f_title_font_size=”eyJhbGwiOiIzNiIsInBob25lIjoiMjgifQ==” f_title_font_line_height=”eyJhbGwiOiIxLjIiLCJwaG9uZSI6IjEuNCJ9″ f_title_font_family=”137″ f_title_font_weight=”700″ tdc_css=”eyJhbGwiOnsibWFyZ2luLXRvcCI6IjIwIiwiZGlzcGxheSI6IiJ9fQ==”]

Encryption consists of hiding content from unintended public. So, in order to protect the path to the source file, we encrypt the source and obfuscate the link to the decrypting index file, a method used in all DRM systems. The process includes cutting down the master file to thousands of small pieces (“chinks”) and encrypting each one. Each such chunk has a unique key that can open it, so it;’s not enough for the hacker to put his or her hands on one key only. The keys are stored on a different server and are called by an authorized player. The process is done in real time during playback and is unique for every user.