home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
radio2
/
satilite.txt
< prev
next >
Wrap
Text File
|
1992-10-03
|
5KB
|
260 lines
Sat-Fax
---------------------------------------
---------------------------------------
INTRODUCTION
---------------------------------------
SAT-FAX is an uncopyrighted, mostly
unoriginal magazine dedicated to the
unauthorized reception of Video Cipher
scrambled programs.
Intoduction to the Video Cipher //:
The Video Cipher // was formerly distributed by
M/A com, but now is distributed by general
instraments. The video cipher utilizes a
National Security Agency "p king U.S. security
regulations. M/A com & GI have apparently
notattempted to bring suit against anyone
involved in scramble busting technology, but most
lawyer ught using a scramble defeat system in
their homes can be prosecuted. Those are the
'rules'...now the facts:
:::::::::::::::::::::::::::::::::::::::
descrambling techniques
:::::::::::::::::::::::::::::::::::::::
1)Cloning: Researchers have discovered a way to
force VC2000(video cipher 2) out of a unit
through U30. Unit internal ID code is forced out
into an external m oning chip which is attatched
briefly to a U30 chip in a second (and third,
etc..) Videocipher units. In plain English, the
authorization number is copied from ciphers, and
the other one will also be authorized. The
obvious problem, though, is that you have to find
a sucker who will buy the services.
2)CLOWNING-TWO: Researchers are offering consumer
packaging in Vancouver, BC (604-684-9625) which
removes authorization matching from internal
memory devices, a u have to pay a "service fee"
to get the chip replaced each month. The
assumption is that this method works like cloning
one, but the point has been reached wh less
expensive than full subscriptions though.
3)TIERING: To me, this seems to be one of the
best descrambling services acailable to day.
Researchers have uncovered a way of extracting
authorization key thr . In plain English: You
just pay for one channel, and you recieve every
other one (Movie channel, Select TV, HBO, Viewes
Choice, etc..)
4) Clocking: This is another succsessful way of
descrambling, maybe even better than the method
mentioned above. This method of descrambling
ignores the satel data is required for
descrambling. By substituting ther own clock,
derived from the one in the Video Cipher, 14.3
(etc..) MHz crystals. This is nick named th
5) RECREATING: The Videocipher utilizes several
key IC components to descramble signals. This
group (Unnamed for legal reasons) has designed a
stand alone des dio, program ratings, etc...).
Recently newly available chips, such as Plessey
Mv1812, which unlocks key hamming code functions
in VC2000 device U28, have made
6) 0000: This may be the mos exotic and probably
the most threatening approach to beating Video
Cipher. Cable system units are addressed
seperate from home un cally picked off by
decoders so this data stream caused the decoder
to ignore all of the individual unit adressing in
the data stream, by modifying this softwa ed
within an individual service, the vc2999 is
preprogrammed to decode all 56 tiers possible,
with EVERY service. In this service, if you ask
the descrambler f
7) A LEGAL WAY OF RECIVING THE PICTURE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The method of descrambling the picture I will
mention here is, to my knowledge, perfectly
legal!. Currently, there are "Dealer Demo Chips"
available. These wi vertizing the movie
companie. To get rid of the box, you must design
a circut to repeatidly issue the Vie command to
you Videocipher. The design will be inclu
***************************************
Random Facts
***************************************
-There are only 50,000 VC 2000s in homes, so the
market is too small to attract "Big Players" yet.
-Software solutions, some "Elegant" in their
simplicity are M/A Com-GI correctable if they
"Purchase" knowlege needed to close their
software holes
-Hardware solutions,not so simple, nor elegant,
are themselve 'copyable' and designers are
finding a hard time in protecting their designs
from unauthorized use
-Fear of getting caugt up with is keeping, and
will keep, most sellers outside of the U.S.
Those setting up distribution in Canada or the
Carribian are trying
-Fear of personal reprisals has also affected
visibility of those who have created successful
techniques.
*A useful program to watch is the Boresight
network, on Westar 5, transponder 1, at 9:00 PM
eastern standard time. (Thursdays)
***************************************
THE END
***************************************
DOWNLOADED FROM P-80 SYSTEMS.....