![Page 1: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/1.jpg)
Team 3Dan Tan
Derek WeismanLeah Wetzel
Shuruthy YogarajahTyler Stump
Vanessa Voss
![Page 2: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/2.jpg)
“Netflix is the world’s leading Internet television network with over 86 million members in over 190 countries enjoying more than 125 million hours of
TV shows and movies per day, including original series, documentaries and feature films.”
![Page 3: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/3.jpg)
Evolution of Netflix
1997 - Netflix is founded
1998 - Netflix.com is launched
1999 - Netflix adopts the
monthly subscription
model
2007 - Netflix introduces
digital streaming in US
2013 - Netflix
premieres “Netflix
Original” Content
![Page 4: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/4.jpg)
Yesterday - Netflix announces ‘Download and Go’
https://www.youtube.com/watch?v=7Bkz5awxwYk
![Page 5: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/5.jpg)
• Netflix was invented after Blockbuster charged co-founder, Reed Hastings, a $40 late fee on his ‘Apollo 13’ rental
• Netflix envelopes are rectangular because square envelopes cost more to mail via USPS. If these envelopes were square, it would have cost Netflix an additional 225M to mail DVDs in 2011
• Netflix gathers data from BitTorrent and other illegal pirating sites to determine which content they will purchase for distribution via their streaming service
Fun Facts
![Page 6: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/6.jpg)
![Page 7: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/7.jpg)
Security Tools• Every few months, Netflix unveils a new security tool• These started with Security Monkey and include FIDO (Fully
Integrated Defense Operation), Lemur, and Sleepy Puppy• Coming soon is Dirty Laundry as the tenth security release
![Page 8: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/8.jpg)
Power of Automation• Being such a large company, Netflix needs to find ways to move faster
when dealing with security threats• Their solution is automation• Automation helps them identify compromised accounts, respond to
security incidents, and monitor security configurations in a way that is much quicker than a manual approach
• Security personnel are alerted when an issue is detected• That way, personnel aren’t bogged down by being alerted to every
minuscule change in the system
![Page 9: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/9.jpg)
Open Company
• No BYOD Policy• OSS (Open Source Software) for a large
amount of their software and tools• Also have looked into innovative physical
security
![Page 10: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/10.jpg)
![Page 11: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/11.jpg)
Information Security
• These are two-fold• Netflix has both their company data to protect as
well as the information of their customers• Company that is completely cloud based
![Page 12: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/12.jpg)
• Netflix is proactive instead of reactive• Search for compromised accounts on sites like
Pastebin in order to protect their users• Collaboration between engineers and product
deployment (DevOps)• Allows issues to be communicated earlier before
they become a serious problem
![Page 13: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/13.jpg)
![Page 14: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/14.jpg)
Getting Access to Movies• 5-step process• User Authentication - Makes sure that the viewer is indeed a
Netflix subscriber and has the right playback privileges• Device Authorization - Identify the device that the user is
playing from, and to ensure that the limit of six is not exceeded
![Page 15: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/15.jpg)
• Instruction Fetching - The player gets information from the Netflix servers about how to play the movie, and where to get the files (only happens after device is authorized)
• License Acquisition - Controls DRM-encoded video and audio files. – It is the last security step before playback
can begin, basically getting license to decrypt the video.
• Playback - Playback can finally take place once these constraints have been enforced. The player talks directly to the Netflix Streaming servers, which in turn assume that all security concerns have already been taken care of by the other components.
• PROBLEM? Race Condition. Once you reach the playback session, Netflix assumes that everything is safe. (similar to the angry bird reference)
Attached from“Lecture Five and Six”, Nicholas Davis
![Page 16: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/16.jpg)
![Page 17: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/17.jpg)
Layers of Security
• Requests user authentication before playing the video• Only allowing a maximum of six playback devices per
account• Encrypts the video content• Providing unique decryption keys per movie and
device
![Page 18: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/18.jpg)
How do they do that?• The security checks take place over the duration of the playback experience,
and delegated to several different Netflix components and servers, each with distinct responsibilities. (Segregation of duties)
• Microsoft Silverlight prevents cross-site scripting and makes sure that the player only talks to Netflix servers
• Microsoft DRM component gets an individualized key for each player and coordinates with the License server to acquire keys that are unique to the movie and the player
![Page 19: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/19.jpg)
What’s so GREAT about these different servers?
• Information is shared between these different servers via cookies
• By delegating tasks, these servers and client components can focus on the particular constraints that they have to enforce, and assume that other constraints are checked somewhere else
• Security on each of these servers can be tightened as desired, when Netflix detects a breach at a particular point
• The encryption of the video files ensures that only players with decryption algorithm (Netflix player) can view them
• If one of those decryption keys is compromised then the security threat is minor, because the keys are individualized and can only be used by one player
![Page 20: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/20.jpg)
![Page 21: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/21.jpg)
Location
• Los Gatos, California– Floods, earthquakes, tropical storms
• Railroad Tracks• Highway
![Page 22: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/22.jpg)
Exterior
• Light Posts• Sidewalks• Landscape• Walls• Road Entrance• Cameras
![Page 23: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/23.jpg)
Interior• Glass Walls and Doors
– Territorial Reinforcement• Cameras• Front Desk Employee
– Natural Surveillance
![Page 24: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/24.jpg)
Mobile Access
• From Keyfobs to Smartphones– Digital key
• Have to know…– Phone can be used as key– Passcode to the phone– How to activate the key with the app
![Page 25: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/25.jpg)
![Page 26: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/26.jpg)
Automatic Approaches
• Security Monkey– Monitors internal security configurations
• Scumbler– Automatic web searches
• Fully Integrated Defense Operation– Automatic incident response
![Page 27: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/27.jpg)
Detecting the Host• Problem– With FIDO, there hasn’t been a focus on detecting the host
• Suggestion– Timely DNS Resolution
![Page 28: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/28.jpg)
![Page 29: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/29.jpg)
HTTPS
• HTTP vs. HTTPS• Encryption is critical
for ensuring safe communication – and personalized communication
![Page 30: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/30.jpg)
MLS
• MLS is the Best• Superior flexibility for cross-communication
![Page 31: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/31.jpg)
The Future
• Offline Mode?!?• Potential Problem: data gaps?
![Page 32: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/32.jpg)
![Page 33: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/33.jpg)
AWS Outage• Cloud computing
![Page 34: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/34.jpg)
• What went well?– Multiple zones – hot zones– S3 storage
• What failed?– Manual operations – shifting services out of zones– ELB Load Balancing – servers down? Service lost!
![Page 35: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/35.jpg)
• Chaos Monkey– Constant simulated failures so that Netflix systems
know how to react• Chaos Gorilla– Total service failure as opposed to smaller,
localized breaches
![Page 36: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/36.jpg)
![Page 37: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/37.jpg)
Restrictive Legal, Regulatory, and Compliance
• Financial– Securities Exchange Act of 1934 – Sarbanes Oxley
• Payment Processing– PCI DSS (Payment Card Industry Data Security Standard) Compliance (Same)
• Content, IP, Licensing, Distribution– Licensing contracts with TV Shows, Networks, and Studios
• 10/18/2016 - Relativity Media sued Netflix for breach of contract and libel
• NOT subject to Federal Communication Commission (FCC) regulation– FCC - “It is outside of open internet.”
![Page 38: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/38.jpg)
Netflix’s Response to Regulation and Compliance
• 2012 – Formed Political Action Committee ‘FLIXPAC’– Net Neutrality – Bandwidth Caps – Usage-based Billing (Canada) – VPPA, Video Privacy Protection Act
(US)• Supported 2012 Amendments, which
allowed video rental companies to share rental information on social networking sites, with customer permission
![Page 39: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/39.jpg)
Protective Legal, Regulatory, and Compliance
• Proprietary Intellectual Property– Protected by Patent, Trademark, Copyright, Trade
Secret Laws, Confidentiality Agreements• Stop Online Piracy Act (SOPA)• Protect IP Act (PIPA)• Computer Fraud and Abuse Act (CFAA)
![Page 40: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/40.jpg)
![Page 41: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/41.jpg)
Application Overview• Data Collected by the App:
– Sign Up - Personally Identifiable Information (Name, Postal Address, Email Address, Telephone Number)
– Payments - Payment Information (Credit Card Number, Expiration, Security Code)
– User Preferences/Profiles - Reviews, Ratings, Account Settings
– Use Data - • Interactions with User Interface and
Advertising• Computer, device, and software data• Title selections, watch history, search
queries
![Page 42: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/42.jpg)
Application Security• Application Security Best Practices:
– Container-based development > simplified development experience– NetflixEverywhere Global Architecture> service availability, latency,
data replication, compute capacity, and efficiency– HTTPS > secure video streams– Integration with Amazon Web Services
• S3 > Big Data• Simple Email Service > Customer Emails• ECS > Container Scheduling, Execution, and Integration
– Netflix is committed to open source. • Big Data, Build and Delivery Tools, Common Runtime Services and Libraries,
Content Encoding, Data Persistence, Insight, Reliability, Performance, Security, User Interface
![Page 43: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/43.jpg)
External Security• External Security Considerations
– Device– Browser– Internet Service Providers– 3rd Parties
10/14/16 - “As part of our regular security monitoring, we discovered that credentials that match your Netflix email address and password were included in a release of email
addresses and passwords from a breach at another company.”
![Page 44: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/44.jpg)
Availability is a Priority• On Integrity/Confidentiality:
– “We believe we use reasonable administrative, logical, physical and managerial measures to safeguard your personal information against loss, theft and unauthorized access, use and modification. Unfortunately, no measures can be guaranteed to provide 100% security. Accordingly, we cannot guarantee the security of your information.”
• On Availability:– “ Members can watch as much as they want,
anytime, anywhere, on nearly any Internet-connected screen. Members can play, pause and resume watching, all without commercials or commitments.”
![Page 45: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/45.jpg)
![Page 46: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/46.jpg)
• Current Netflix Operations Security in place to monitor day to day work and use are:– Creating and maintaining user accounts and access for data
access– Carrying out security assessments– Limiting excessive customer data
• Customer name and billing Information aka credit card numbers-Sensitive Customer Data
– Service Level Agreement with third party operations provider--Indicating acceptable and unacceptable performance and recovery baseline agreements in the case of a breach within Netflix customer data from the third party• Sensitive customer data is also maintained in third parties used in
Operations for Netflix, one of their third parties is Amazon Web Services (AWS)
![Page 47: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/47.jpg)
• No threats have CURRENTLY been discovered at Netflix concerning Operations Security
• Periodic Vulnerability Testing– Check for new threats – Confirm old threats– Helps evaluate company's security posture
![Page 48: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/48.jpg)
![Page 49: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/49.jpg)
• Moved from vertically scaled operation (data centers) to horizontally scaled highly reliable system (cloud)– August 2008 - Netflix Database Corruptions stops operations, could not
ship DVDs– January 2016 - Netflix operates completely on cloud
• 7 Year process to finally finish– 8 times as many streaming members– Cloud has supported the rapid growth– Elasticity of Cloud allows Netflix to add thousands of virtual servers and
create storage– Cloud cost per streaming is way cheaper then in a data center– Can Now Stream Netflix Worldwide
![Page 50: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/50.jpg)
• There were a number of outages in data centers---reason for moving to cloud BUT there were outages in cloud as well– Christmas Eve of 2012– Had issues with AWS that routes network traffic to
Netflix– Now resolved
![Page 51: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/51.jpg)
![Page 52: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/52.jpg)
BYOD• Netflix wants to maintain a corporate culture
that is based off of freedom and trust• Do not incorporate BYOD security or Mobile
Device Management (MDM) software and policies
• Netflix does not want to govern employee owned devices
• Their tactic is to only protect the data• Believe that extreme IT security actions will
lead to under the table action by employees
![Page 53: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/53.jpg)
Threats
• Information gets transferred where it should not be - lost devices, memorized passwords, malware infections
• How will they address security concerns without containerization and virtualization through MDM
![Page 54: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/54.jpg)
Problems and Suggested Change
• Problem:– Employees may not be aware of the correct rules and
standards in which to abide for BYOD and therefore information may end up in the wrong hands if employees are not correctly education
• Suggestion for change:– Set guidelines and educate employees of BYOD expectations
as a part of training and then expect employees to follow through. Explain it is just a part of the process of using BYOD
– Should not interrupt the corporate culture of trust and freedom by educating employees
![Page 55: Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-Madison](https://reader034.vdocument.in/reader034/viewer/2022042706/58a3080f1a28abea508b61a7/html5/thumbnails/55.jpg)
Referenceshttps://www.hidglobal.com/doclib/files/resource_files/netflix-pilot-cs-en-2012-09-24.pdf http://blogs.wsj.com/cio/2015/06/01/how-netflix-manages-security-in-the-age-of-devops/
https://informationdiscoverydigest.com/2013/09/19/netflix-protecting-data-over-devices-byod-and-ediscovery/http://fieldguide.gizmodo.com/stop-netflix-youtube-spotify-and-more-from-eating-u-1759395052
http://arstechnica.com/information-technology/2016/02/netflix-finishes-its-massive-migration-to-the-amazon-cloud/https://media.netflix.com/en/company-blog/completing-the-netflix-cloud-migration
http://techblog.netflix.com/2012/12/a-closer-look-at-christmas-eve-outage.htmlhttp://www.worldtvpc.com/blog/amazon-want-100-of-netflix-streaming-on-their-cloud/
https://ir.netflix.com/index.cfmhttps://media.netflix.com/en/about-netflix
https://twitter.com/netflix/status/803962377997688832?ref_src=twsrc%5Etfw https://www.cnet.com/news/blockbuster-laughed-at-netflix-partnership-offer/
https://www.quora.com/Why-is-the-Netflix-DVD-envelope-rectangularhttp://www.forbes.com/sites/timworstall/2013/09/16/how-clever-netflix-monitors-bittorrent-to-purchase-shows/#
3b4e4b4c38cdhttps://pomelollc.files.wordpress.com/2009/04/pomelo-tech-report-netflix.pdf
https://github.com/Netflix/msl/wiki/Netflix-ID-Cookies-User-Authentication https://netflix.github.io/
https://ir.netflix.com/index.cfm