Well, I do not believe they are using Internet for updating their official receivers.
To do that they would need to replace all their official receivers at cable operators. The current receivers are not capable of that due to hardware limitations.
Well, I do not believe they are using Internet for updating their official receivers.
To do that they would need to replace all their official receivers at cable operators. The current receivers are not capable of that due to hardware limitations.
https://www.cisco.com/c/en/us/products/collateral/video/digital-encoders/data_sheet_c78-728203.html
If that is the case, can these firmware be intercepted and moded for other type of receivers ?Believing is not real facts and should not be used to form an opinion.But we all can,of course.
Most all Powervu/cisco receivers have a network port.Code:https://www.cisco.com/c/en/us/products/collateral/video/digital-encoders/data_sheet_c78-728203.html
And they are all addressable through internet.
this is its function
"Ethernet IP data and control monitoring"
The link specifically say
"IP data can be received and output at rates up to 50 Mbps. "
Now,its time you do not relay so much in your beliefs and more in facts.
They have internet port,most probably they are able to push a firmware update through it in such an emergency as this one.
If that is the case, can these firmware be intercepted and moded for other type of receivers ?
Sony for example. But it does not matter. I think you should try to get the ECM key first. If you can't even decrypt the EMM to read out the ECM key, then don't waste time thinking about ECM hash modes.
AND NO - EMM keys are not expired.
AND NO - keys are not updated via the internet.
That's just bullshit you may hear sometimes. Focus on the only real issue here - being unable to decrypt EMM!
I also believe that at present the keys are not updated via Internet.
They can implement this feature after a few years. The migration period is not so short.
During the migration period they may be still updating the keys over the air but use the Digital Glue protection. More details here http://www.digitalglue.com/case-study-simulcrypting-with-powervu/
Forget about updating ECM keys by internet.
The problem reside in new firmware spooled by internet,then they do not need to change the way the way they send ECM keys through satellite.
While people cannot decrypt EMM to get it,they are secure.
No ECM keys through internet necessary.
And that site is just propaganda from the same company that sells the security,wouldn't they all assert they are secure and boast their strength ?
Forget about updating ECM keys by internet.
The problem reside in new firmware spooled by internet,then they do not need to change the way the way they send ECM keys through satellite.
While people cannot decrypt EMM to get it,they are secure.
No ECM keys through internet necessary.
And that site is just propaganda from the same company that sells the security,wouldn't they all assert they are secure and boast their strength ?
Believing is not real facts and should not be used to form an opinion.But we all can,of course.
.....
Now,its time you do not relay so much in your beliefs and more in facts.
They have internet port,most probably they are able to push a firmware update through it in such an emergency as this one.
Well at the end of the day if we can't get our hands on one of the provider receivers we are dead in the water, sad day.
Is not about being arrogant,just trying to keep thoughts on the ground level,concise,with some fundament.Please don't be so arrogant my friend. I do have very much experience in reverse engineering. Although I am already a retired person, sometimes I can point people to the right direction. We have a hobby comunity over here and we should work as one team. Everyone can contribute to achieving our goal. Every opinion should be carefully considered and not rejected.
I do understand that many providers' receivers may have a LAN port and may be able to connect to Internet provided they have this function in the firmware.
We are not talking about updating the firmware over this port. Every receiver has an USB port for that. Someone was talking about updating the keys over Internet. That's what we are talking about
The new firmware may be distributed as an encrypted file. Then use USB port to upload it to the receiver and the receiver will decrypt it before flashing the memory chip.
They will not deviate from OTA updates to receivers when every customer, both professional and retail, has a guaranteed OTA connection. There's no reason to introduce USB or internet based updates (which only a small fraction of customers will have) when OTA has worked since the beginning of time, and some will argue is far more secure than any other update method.
They already did deviate,nobody has seen the new updates OTA,otherwise the problems would have been solved already.
My understanding is that they keys are still being updated over the air.
Probably they just introduced another layer of encryption on top of the existing data transmission protocol. The ECM and EMM keys now may be transmitted over the air in an encrypted form, more details here http://www.digitalglue.com/case-study-simulcrypting-with-powervu/
Reading that it seems the end goal for AFN is to eventually move away from Cisco/PowerVu altogether. It is interesting to note that they embedded the Verimatrix rather than a using a CAM.
As for the EMMs, nothing earth-shattering, per the case study, Verimatrix and PowerVu EMMs are being sent OTA.