ANALISIS OF THE PRESENT SITUATION OF CRACK NAGRA2: This information I hope can clarify something the present state of crack of Nagra2 and the future possibilities of this one: __________________________________________________ __________________________________________ _____ The change of revision of the ROM110 has consisted of the modification of the table of bugcathers of the Eeprom to modify the behavior of some commandos, among them cmd $48 (one of bugs of those cards). Bugcathers is small parts of code that are introduced in eeprom of cards, and which they modify the treatment that occurs to the commandos, allowing to the operator to modify his envio and to operate on them once they arrive at cards. This method to update the revision of cards has been used from the beginning of Nagra1, and serves to resolve errors in the treatment of the commandos (bugs). The present state of cards Nagra2, is similar to which existed with the ROM3/ROM10 at the time of Nagra1. In one first stage of fight against the pirateo they were limited single to change *** s (as we are at the moment), later began with the updates of revisions (modification of bugcathers) extending this during a pair of years, soon the shipment of EMMs with absorbed code, and finally the physical change of cards. Thus they happened but of 4 years where always hackers was able to deceive those protections, since it was had dump complete (ROM, ram and EEP) of cards. Single a simultaneous card change Nagra/Seca (with the fusion of the operator) was able to paralyze the pirateo and to delay but of 6 months the new appearance of the pirate emulators (the present ones). To day of today it is confirmed that dump complete of the ROM110 exists (ROM, ram and EEPROM). That in if already he constitutes a tremendous problem for the operator, since no matter how much the operator does, always it is possible to analyze his actions step by step (revisions) and to discover of that such modifications towards it consist to continue emulating the system. This would become by means of the incorporation of "back doors" (backdoors) in card ROM110. These back doors consist of small codes similar to bugcathers, introduced in the card by own hackers and that allow the re-entry to the card of a fast and safe form but. The own card originally already has a "backdoor" that is used in factory for the recording of bugcathers initial, and that can be used for these aims. Also codes exist blockers in form of bugcathers that are introduced in cards to avoid that the card is closed with one of these revisions. At the moment this confirmed equally that exists to blocker for this assignment, and that would allow to protect the card to continue investigating. Also this confirmed that is had the EMMs which they have been used for the update of the revision of cards (captured of stream of video), reason why these could be used a posteriori to analyze them and to return to emulate the ROM110 the new revision. There is another slope of hack of cards that also can be used for the study; Knowing the totality the parts of the ROM110 (ROM, ram and EEPROM) as they are known, exists what emulation by software is called, that is not another thing that to emulate the card in a PC program. In nagra1 "Counterpart" existed the program that was used as if outside an original card; Him commandos can be sent to the program, and the program answered as if it was the original card (hard). Of this form it can, sending the EMMs of update of revision, to obtain the new EEProm of the updated card, with no need if it wants to have blockers or backdoors. At the moment an adaptation of that program exists also so that _____________________________________________ works with the ROMs present of Nagra2. __________________________________________________ _____ All this information I hope serves to explain, no longer reason why they can count in an u other sides, or by the rumors, if not by the experience of the past and the present knowledge of cards of Nagra, if he is really feasible that the emulation follows ahead with those changes. In my opinion, this emulation will always follow ahead, although depending on the moment that wants it to present hackers (like when they publish *** s, etc). In the last 3 changes of *** s hackers have been fast, and they have published them these hours later (or even before) of being used. We will hope that with new *** s they continue acting equal. It is not necessary to forget either that of cards which they work under Dry encapsulation (v9), it has not even been begun has to speak. And of that other slope of crack they have been heard for a long time information that assure that MOSC exists, and therefore also sufficient information for the emulation would exist (it has perhaps not come to the light to be at the moment unnecessary). What this clear one is that if does not exist physical card change on the part of Nagra2 operator, the pirateo will continue existing. They have always had methods to make difficult so much the pirateo as to make it nonviable (daily changes of *** s for example, and at the moment by the power of cards could even make changes of *** s every minute). But it seems to be that that does not interest to them, and prefer to play the cat and the mouse.