larley

Results 20 comments of larley

Could a post a sample of the request and response if you have the time? The only other piece of information I found is this TypeScript file: [https://github.com/DaXcess/node-spotify-ap/blob/main/lib/audio/AudioKeyManager.ts#L10](https://github.com/DaXcess/node-spotify-ap/blob/main/lib/audio/AudioKeyManager.ts#L10) which indicates...

```python r = requests.post( url="https://gew4-spclient.spotify.com/playplay/v1/key/f9608d4d11ce765a2f901fa8fddf76b0fd9d9e81", headers={ "Authorization": f"Bearer {token_manager.get_access_token()}", }, data=bytes.fromhex("0803121001a3840cfd43462497863e0d52139bd62001280130e7fec4b406") ) print(r.status_code, r.content.hex()) # 200 0a1058cb0cd8f16b0f7bd4fe0890910a7e4412040895d37d ``` This works

Some analysis later i got to this point: ``` PlayPlayLicenseRequest: version: 3 token: 01a3840cfd43462497863e0d52139bd6 interactivity: INTERACTIVE content_type: AUDIO_TRACK PlayPlayLicenseResponse: obfuscated_key: aaedcf042aae01f00836ed93e2ca1c71 ``` I parsed the request and response as Protobuf...

ok it seems like this is quite complicated. For reference: ``` https://github.com/librespot-org/librespot-java/discussions/421 https://github.com/librespot-org/librespot-java/discussions/421/comments/1812935/threads ```

I did it! Look at this: `https://github.com/librespot-org/librespot-java/discussions/421#discussioncomment-10035969`

I won't upload it here but it's the decrypt code leaked compiled using CMake on Windows. The code is accessible on the internet, that's all I'm going to say.