dj5
It sounded to me like you do:
MediaDrmID = SHA256(userid + package_name)
I was pointing out that this leaks a lot of information MediaDRM IDs usually don't. Especially if userid always is 0, 1, 2, .. and package_name is any of the known clients for that service, it would be easy for the remote end to calculate all possible hashes, and thus being able to detect userid and package_name, essentially reversing the hash.
I instead suggested you do something like this to prevent that, essentially salting the hashes:
MediaDrmID = SHA256(random_persistent_key + userid + package_name)
But I didn't know ANDROID_ID was a thing. If that one already has high enough entropy, that might be enough. Seems unclear from the documentation I found whether it even is random at all though, but I guess you know.