


Many providers coding Irdeto 2&3 hacked, and for a long time.įrom the publication of hacks all stops that the owner-developer of the CAS publicly threatened violators with all possible penalties up to criminal prosecution through Interpol. Of course,the hacking also helped security companies to develop better security. It is indeed amazing what some guys did ( a very few),that allowed for whole communities to develop to what's today. Reading and writing cards have generally been made by glitching the chip looking for a fault that allow to write code that enables the reading of sectors,after that the analysis would determine if there is a way to write to it,and the possibility to extract deeper information in its hardware (rom,sysrom,maprom,others)Īnd more importantly,if the system can be emulated by software,which some cannot.

Of course you understand what kind of equipment is necessary for the task and how many people is in position to use it,and come up with a successful dump. People figure out a way to dump the content of their security chip,then analyzing the content/code to understand how it works I would consider myself quite knowledgeable (i'm a c++/c# programmer, electrical engineer and work with arm/pic mcu's), but the though of reverse engineering an encryption algorithm blows my mind! I am fascinated by the ability people have to figure this stuff out. Who cracked it last time and how was it done? If an encrypted TS stream was compared against a time-accurate decoded version of the stream, would pattern searching help reveal the encoding sequence and thus ecm keys could be found? So if the encryption was upgraded, why is it not called Irdeto3? Irdeto2 would indicate it is still using the same system/algorithm? Most of bulsat is down because they are using a different encryption method (there own proprietary system as I understand it). In the past, a few more packages (like n*va and YES in 7W) were cracked,but they upgraded their encryption to a newest and more safe.Īnd of course,the same happens to the other encryptions,like nagra,conax etc. this encryption isn't a "light" one, like biss ,where a script is enough to decode channels.īulsat is in an old irdeto2 and already cracked system(and not full package,just a few only channels)and those k*eys are already found once,and just rolling.
