Phinda ufumane inkxaso yokudlala umxholo okhuselweyo kwiRaspberry Pi yakho ngezi zisombululo

I-Raspberry Pi OS, iWidevine ibonwa kwaye ingabonakali

Yayiyeyona nto ihlekisayo kum. Nangona ukusetyenziswa endikwenzayo ayibobomi okanye ukufa, ngoLwesine odlulileyo Ndikhangele ulwazi malunga nenkxaso ye-DRM kwi Raspberry Pi ukufumanisa ukuba ebekhona ... ukuya kuthi ga kwiiyure ezingama-36 ngaphambili. UGoogle uhlaziye iWidevine kwaye wayishiya ibhodi ye-raspberry ixhonyiwe, ke abanini bayo kufuneka balinde isisombululo esisemthethweni okanye, ukuba bayangxama, benze iinguqu ezimbalwa ngokwabo.

Umsonto Kwiqonga elisemthethweni leRaspberry Pi, ukuqokelela okwenzekayo. Kuyo, ebendilala kuyo ukusukela ngoLwesine odlulileyo, bakwapapashe izisombululo ezimbalwa. Eyokuqala kukuhlaziya inkqubo yokusebenza, kuba isiziba sele sifikile eBullseye (Debian 11). Okwesibini kukudibanisa izitshixo kwifayile ye- I-Widevine nguBuster. Akukho sisombululo sisemthethweni, nangona inkqubo yokusebenza inokuhlaziywa, iRaspberry Pi OS isekwe kwiDebian 10 ngokusemthethweni.

Fumana inkxaso ye-DRM kwiRaspberry Pi

Indlela 1: nyusela kwiBullseye

Kuba isiziba sele siseBullseye, eyona nto ikufutshane nokuba sesikweni kukuhlaziya inkqubo yokusebenza, into esiza kuyiphumeza ngokulandela la manyathelo:

  1. Sihlaziya indawo yokugcina, iiphakheji kunye nokusasazwa ngale miyalelo:
apt update
apt upgrade
apt full-upgrade
  1. Emva koko sihlela imithombo kunye:
sudo nano /etc/apt/sources.list
  1. Into elandelayo ekufuneka siyenzile kukutshintsha yonke into enxulumene neBuster ukuze iBullseye ivele:
deb http://deb.debian.org/debian bullseye main contrib non-free
deb http://deb.debian.org/debian-security/ bullseye-security main contrib non-free
deb http://deb.debian.org/debian bullseye-backports main contrib non-free
  1. Senza okufanayo kwifayile ye-apt.conf, sitshintsha iBuster yaya eBullseye kwaye sishiya abanye njengoko kunjalo.
  2. Okokugqibela, siphinda inyathelo lokuqala kwaye samkele utshintsho.

Olunye ukhetho kukuqhuba le script.

Indlela yesi-2: faka ipatch kwiBuster

Olunye ukhetho kukusebenzisa isichibi hayi ngokusemthethweni ukuya kwiBuster. Ukwenza oku, kuya kufuneka uvule i-terminal kwaye ubhale yonke le miyalelo, ibengcono ngexesha:

sudo apt-get update
sudo apt-get install libwidevinecdm0 gnupg
curl -s --compressed "https://wagnerch.github.io/ppa/buster/KEY.gpg" | sudo apt-key add -
sudo curl -s --compressed -o /etc/apt/sources.list.d/wagnerch-buster-ppa.list "https://wagnerch.github.io/ppa/buster/wagnerch-buster-ppa.list"
sudo apt-get update
sudo apt-get upgrade
curl https://k.slyguy.xyz/.decryptmodules/widevine/4.10.2252.0-linux-armv7.so | sudo tee /opt/WidevineCdm/_platform_specific/linux_arm/libwidevinecdm.so >/dev/null
sudo reboot

Kubalulekile ukuyinyanzela loo nto Akukho nto ichazwe apha isemthethweni. Iqela lomphuhlisi we-Raspberry Pi OS liceba ukukhupha i-patch yabo ye-Buster, kodwa akukho lizwi lokuba liya kufika nini. Kwelinye icala, njengoko kuchaziwe kwiforum, umntu ngamnye unoxanduva lwento enokwenzeka kubo ukuba bathatha isigqibo sokwenza olo tshintsho bebodwa. Kwaye, ewe, kufanelekile ukuxhasa yonke idatha yakho ebalulekileyo kuqala.

Ndikhetha ukulinda into engama-99% esemthethweni, oko kukuthi, yintoni eyenziwa ngabaphuhlisi be-Raspberry Pi OS, kodwa ngenxa yokuba andidingi ukudlala umxholo okhuselweyo kwibhodi yam encinci. Ukuba umntu uyayidinga, sele ungayilungisa ngeendlela ezimbini ezahlukeneyo.


Shiya uluvo lwakho

Idilesi yakho ye email aziyi kupapashwa. ezidingekayo ziphawulwe *

*

*

  1. Inoxanduva lwedatha: I-AB Internet Networks 2008 SL
  2. Injongo yedatha: Ulawulo lwe-SPAM, ulawulo lwezimvo.
  3. Umthetho: Imvume yakho
  4. Unxibelelwano lwedatha: Idatha ayizukuhanjiswa kubantu besithathu ngaphandle koxanduva lomthetho.
  5. Ukugcinwa kweenkcukacha
  6. Amalungelo: Ngalo naliphi na ixesha unganciphisa, uphinde uphinde ucime ulwazi lwakho.