

Each playback system has its own unique public/private key pair. Instead the AES keys are themselves encrypted using asymmetric 2048 bit RSA. The symmetric AES keys used to encrypt the content essence must be carefully protected, so they are never distributed directly. The distributor can choose to encrypt the media (MXF) files with AES encryption to stop unauthorised access. Wikipedia has a pretty good description of how it's done: The FTP protocol itself has been disabled by default since version 88 and now the time has come to end an era and discontinue the support for this outdated and insecure protocol - Firefox 90 will no longer support the FTP protocol. Removing FTP brings us closer to a fully-secure web which is on a path to becoming HTTPS only and any modern automated upgrading mechanisms such as HSTS or also Firefox's HTTPS-Only Mode, which automatically upgrade any connection to become secure and encrypted do not apply to FTP. To date, many malware distribution campaigns launch their attacks by compromising FTP servers and downloading malware on an end user's device using the FTP protocol.Īligning with our intent to deprecate non-secure HTTP and increase the percentage of secure connections, we, as well as other major web browsers, decided to discontinue support of the FTP protocol. The biggest security risk is that FTP transfers data in cleartext, allowing attackers to steal, spoof and even modify the data transmitted.


A post on Mozilla's security blog calls FTP "by now one of the oldest protocols still in use" - and it's suffering from "a number of serious security issues."
