T
thefatty
As title. Is there a program/script to find the ecm/emm keys from a ts stream? How come bulsat is cracked but no other packages (like beIN)?
no... this encryption isn't a "light" one, like biss ,where a script is enough to decode channels...
bulsat is in an old irdeto2 and already cracked system(and not full package,just a few only channels)and those k*eys are already found once,and just rolling.
in the past, a few more packages (like n*va and YES in 7W) were cracked,but they upgraded their encryption to a newest and more safe...
and of course,the same happens to the other encryptions,like nagra,conax etc...
If it were that simple.......So if the encryption was upgraded, why is it not called Irdeto3? Irdeto2 would indicate it is still using the same system/algorithm? Most of bulsat is down because they are using a different encryption method (there own proprietary system as I understand it).
If an encrypted TS stream was compared against a time-accurate decoded version of the stream, would pattern searching help reveal the encoding sequence and thus ecm keys could be found?
Apparently someone dumped their cards or security elements.I have not seen any system broken without opening their cards.Who cracked it last time and how was it done?
People figure out a way to dump the content of their security chip,then analyzing the content/code to understand how it worksI am fascinated by the ability people have to figure this stuff out. I would consider myself quite knowledgeable (i'm a c++/c# programmer, electrical engineer and work with arm/pic mcu's), but the though of reverse engineering an encryption algorithm blows my mind!
Apparently someone dumped their cards or security elements.I have not seen any system broken without opening their cards.
Does that mean whoever dumped their eeprom/nand would have been traceable at the time?
thats right they are completly crazy... btw. theres another example young kid has been busted and prosecuted in case of hacking crap denuvo encryption used for secure games by irdeto > _https://kotaku.com/renowned-hacker-arrested-for-cracking-denuvo-anti-pirac-1827874582Many providers coding Irdeto 2&3 hacked, and for a long time.
From the publication of hacks all stops that the owner-developer of the CAS publicly threatened violators with all possible penalties up to criminal prosecution through Interpol.
If anyone remembers (or knows) the person who hacked Irdeto 1 and posted on the public the results of the break-in, died in his apartment under mysterious circumstances.
P. S.
On many sites dedicated to hacking, still write: "Discussion bypass Irdeto encoding on our site is prohibited!"
Traceale in the way they could find who have done it?
No,because even though the card has unique information and could be traced to the account the card belongs to,eeprom is easily redacted to hide or remove the information.
Irdeto always used group and unique addresses to target their customers (basically,ECM is globally decrypted,same keys for all cards,but since they changed EMM keys several times a day,and for this you need to have keys from an active account to be "targeted" or "hit" with updates) ,so in fact you need specific account information,that might need to be also active,in order to have a working emulation.
Many rival companies started by hacking their competitors and released the card dumps to the public,so,is not just about people doing it for a hobby.