Introduction to DRM Development (1) Symmetric Key Cryptography, Asymmetric Key Cryptography and Hybrid Cryptosystem
I became interested in DRM (license activation) implementation while developing software, but the development was extremely difficult.
The most important reason for this was the lack of Japanese resources.
In this series, I will explain the development (mainly logic) of DRM as much as possible.
The first article will explain asymmetric cryptography, symmetric key cryptography, and hybrid cryptosystem.Read more…
Usually, a Bluetooth connected keyboard cannot be used in the BIOS or FileVault unlocking screen.
I looked for a way to bypass this, but the only way I could find was to use a feature called HID Proxy.
This article explains how to use the Bluetooth connected keyboard in the BIOS and FileVault password entry screen with the HID Proxy.Read more…