question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Tool used for segmenting & encrypting

See original GitHub issue

Hi, i’m reproducing all demos in https://github.com/google/shaka-player; i have two question:

  1. which tool is used for “dash process” (the segmentation process of multimedia files) for .mp4 e .webm files?
  2. Which tool is used for encryption process?

Thanks a lot.

Issue Analytics

  • State:closed
  • Created 7 years ago
  • Comments:8 (5 by maintainers)

github_iconTop GitHub Comments

1reaction
joeyparrishcommented, Dec 14, 2016

If you haven’t tried our tutorials yet, please check them out: http://shaka-player-demo.appspot.com/docs/api/tutorial-basic-usage.html

After that, if you have any further questions about playback or configuring the player, please let us know. We’ll be happy to help.

1reaction
TheModMakercommented, Dec 12, 2016

For the Shaka Player test content, we use another Google project, Shaka Packager (https://github.com/google/shaka-packager). This is able to handle both segmenting media and encrypting the segments.

Read more comments on GitHub >

github_iconTop Results From Across the Web

Best Encryption Software in 2022 - G2
Top Encryption Software. Choose the right Encryption Software using real-time, up-to-date product reviews from 2061 verified user reviews.
Read more >
Code segment encryption - Sevagas
Here are the tools you need: a C source code editor; a C compiler/linker; a debugger; dumpbin.exe tool; a hex editor. Personally I...
Read more >
How to Make an Encryption Program? - DevTeam.Space
VeraCrypt is a freeware utility software that provides “on-the-fly encryption” (OTFE). You can use it to create a virtual encrypted disk, furthermore, you...
Read more >
What Is Cryptography and How Does It Work? | Synopsys
Cryptography gives secure communication in the presence of malicious third-parties—known as adversaries. Learn the the types and principles at Synopsys.com.
Read more >
Security | Twilio Segment
Your data is encrypted at rest and protected by TLS in transit. Your Segment password is hashed using bcrypt, and we manage our...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found