klu9@piefed.social to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 2 months agoEveryone is stealing TVwww.theverge.comexternal-linkmessage-square8linkfedilinkarrow-up11arrow-down10file-textcross-posted to: technology@lemmy.world
arrow-up11arrow-down1external-linkEveryone is stealing TVwww.theverge.comklu9@piefed.social to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 2 months agomessage-square8linkfedilinkfile-textcross-posted to: technology@lemmy.world
minus-squareKairos@lemmy.todaylinkfedilinkEnglisharrow-up0·2 months agoIt would be nice if I could know how to use these services without some “box” or “app”
minus-squareklu9@piefed.socialOPlinkfedilinkEnglisharrow-up0·2 months agoThe article explains that the key services are tied to the hardware & probably controlled (with an attempt at plausible deniability) by the hardware vendors. Guess someone now needs to come up with a a way to pirate these pirate services 😁
It would be nice if I could know how to use these services without some “box” or “app”
The article explains that the key services are tied to the hardware & probably controlled (with an attempt at plausible deniability) by the hardware vendors.
Guess someone now needs to come up with a a way to pirate these pirate services 😁