Blog Post

Kylo’s Hulu Workaround No Longer Working

Stay on Top of Enterprise Technology Trends

Get updates impacting your industry from our GigaOm Research Community
Join the Community!

Hey, remember when we asked how long Kylo’s latest Hulu workaround would last? The answer turned out to be three days.

The web video browser developed for television usage had included a setting in its latest update enabling advanced users to bring Hulu to their screens.

However, the new version now no longer works according to Kylo — a Hulu video will play for 30 seconds then display the message familiar to anyone who’s tried to sneak onto the site using a non-authorized system: “Unfortunately this video is not available on your platform. We apologize for any inconvenience.”

According to a statement from developer Hillcrest Labs CEO Dan Simpkins:

It remains our position that Kylo is simply a Web browser based on open-source Mozilla code, like Firefox, but with a specialized UI (user interface) that includes larger controls. We fully respect the rights of content owners and aggregators, and as such, we do not deep link, re-index, divert users past ads, or overlay different user interfaces on video players. We believe consumers should be able to use the Kylo browser to visit any site on the Web on the display screen of their choice.

Simpkins also points out that major network sites like NBC and Fox are still viewable on Kylo, thus replicating some of Hulu’s content. We’ve reached out to Hulu for comment.

Related GigaOm Pro Content (subscription required): With TV Apps, Over-the-Top Video Gets New Backers

7 Responses to “Kylo’s Hulu Workaround No Longer Working”

  1. DrClue

    Well, Rupert Murdoch has this idea of putting up walls around
    all his properties and charging admission.

    What the Boxee folks need to do is randomize those
    HTTP agent , plugin , screen size and other browser fingerprinting values, as it is probably that fingerprinting
    that is part of the problem.

    Another thing they will probably have to do is adjust the referrer headers to reflect what was occurring on the web site
    and indeed may have to have their browser traverse those
    pages, so as to look like a real user.

    Making their browser behave like an actual random user is
    basically the answer, and in doing that , they can thwart
    most of the fingerprinting techniques.