Register

Welcome to the RDI-Board Community.

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed.


Donate Now Goal amount for this month: 100 EUR, Received: 100 EUR (100%)
Donate to support this site...

Results 1 to 4 of 4
  1. #1
    Junior Member Teacher
    RDI - Board Default Avatar

    Join Date
    Dec 2005
    Posts
    420
    Posts Thanks / Likes

    Default Nagra2 - Situatia actuala

    A aparut un text pe net despre situatia actuala a sistemului Nagra2 si despre posibilitatile de "rezolvare" a situatiei. Poate citeste acest text vreun cunoscator de limba spaniola si ne spune si noua pe scurt despre ce-i vorba. Iata textul:


    ANALISIS DE LA SITUACION ACTUAL DEL CRACK NAGRA2:
    ------------------------------------------------


    Esta información espero pueda esclarecer algo el estado actual del crack de Nagra2 y las
    posibilidades futuras de éste:
    __________________________________________________ __________________________________________
    _____


    El cambio de revisión de las ROM110 ha consistido en la modificación de la tabla de
    bugcathers de la Eeprom para modificar el comportamiento de algunos comandos, entre
    ellos el cmd $48 (uno de los bugs de esas tarjetas). Los bugcathers son pequeñas partes
    de código que se introducen en la eeprom de las cards, y que modifican el tratamiento
    que se le da a los comandos, permitiendo al operador modificar su envio y operar sobre
    ellos una vez llegan a las tarjetas. Este método de actualizar la revision de las tarjetas
    ha sido usado desde el principio de Nagra1, y sirve para solventar errores en el tratamiento
    de los comandos (bugs).

    El estado actual de las cards Nagra2, es similar al que existía con las ROM3/ROM10 en la
    época de Nagra1. En una primera etapa de lucha contra el pirateo se limitaron solo a cambiar
    las ***s (tal como estamos actualmente), posteriormente comenzaron con las actualizaciones
    de revisiones (modificación de bugcathers) prolongándose esto durante un par de años,
    luego el envío de EMMs con código embebido, y finalmente el cambio de cards físico. Así
    pasaron mas de 4 años donde siempre los hackers consiguieron burlar esas protecciones, ya
    que se disponía del dump completo (ROM, RAM y EEP) de las tarjetas. Solo un cambio de tarjetas
    simultáneo Nagra/Seca (con la fusión del operador) consiguió paralizar el pirateo y retrasar
    mas de 6 meses la nueva aparición de las emuladoras piratas (las actuales).

    A día de hoy se confirma que existe el dump completo de la ROM110 (ROM, RAM y EEPROM).
    Eso en si ya constituye un tremendo problema para el operador, ya que por mucho que haga
    el operador, siempre es posible analizar paso a paso sus acciones (revisiones) y descubrir
    en que consisten tales modificaciones para con ello seguir emulando el sistema. Esto se haría
    mediante la incorporación de "puertas traseras" (backdoors) en la tarjeta ROM110. Estas
    puertas traseras consisten en pequeños códigos similares a los bugcathers, introducidos en
    la tarjeta por los propios hackers y que permiten la reentrada a la tarjeta de una forma mas
    rápida y segura. La propia tarjeta originariamente ya dispone de una "backdoor" que es usada
    en fábrica para la grabación de los bugcathers iniciales, y que puede ser usada para estos fines.
    También existen códigos blockers en forma de bugcathers que se introducen en las tarjetas
    para evitar que se cierre la tarjeta con una de estas revisiones. Actualmente esta confirmado
    igualmente que existe un blocker para este cometido, y que permitiría proteger la tarjeta
    para seguir investigando.

    También esta confirmado que se disponen de las EMMs que se han usado para la actualización
    de la revisión de las tarjetas (capturadas del stream de video), por lo que éstas podrían ser
    usadas a posteriori para analizarlas y volver a emular la ROM110 con la nueva revisión.

    Hay otra vertiente del hack de las cards que también se puede usar para el estudio; Conociendo
    la totalidad de las partes de la ROM110 (ROM, RAM y EEPROM) como se conocen, existe lo que se
    llama emulación por software, que no es otra cosa que emular la tarjeta en un programa de PC.
    En nagra1 existía el programa "Sosia" que se usaba como si fuera una tarjeta original;
    Se le pueden enviar comandos al programa, y el programa contestaba como si se tratara de
    la tarjeta original (hard). De esta forma se puede, enviando las EMMs de actualización
    de revisión, obtener la nueva EEProm de la tarjeta actualizada, sin necesidad si quiera
    de disponer de blockers o backdoors. Actualmente existe igualmente una adaptación de ese
    programa para que funcione con las ROMs actuales de Nagra2.
    __________________________________________________ _____________________________________________
    _____

    Toda esta información espero sirva para dilucidar, ya no por lo que puedan contar en unos u
    otros lados, o por los rumores, si no por la experiencia del pasado y los conocimientos actuales
    de las cards de Nagra, si realmente es factible que la emulación siga adelante con esos cambios.
    En mi opinión, esta emulación seguirá adelante, aunque siempre dependiendo del momento que la
    quieran dar a conocer los hackers (como cuando publican las ***s, etc). En los últimos 3
    cambios de ***s los hackers han estado rápidos, y las han publicado éstas horas después
    (o incluso antes) de ser usadas. Esperaremos que con las nuevas ***s sigan actuando igual.

    No hay que olvidar tampoco que de las cards que funcionan bajo encapsulado Seca (las v9),
    aun no se ha comenzado ha hablar. Y de esa otra vertiente del crack se oyen desde hace
    tiempo informaciones que aseguran que existe MOSC, y por lo tanto también existiría información
    suficiente para la emulación (quizás no haya salido a la luz por ser actualmente innecesaria).

    Lo que esta claro es que si no existe cambio de tarjeta física por parte del operador Nagra2,
    el pirateo seguirá existiendo. Siempre han dispuesto de métodos para dificultar tanto el
    pirateo como para hacerlo inviable (cambios de ***s diarios por ejemplo, y actualmente por
    la potencia de las cards incluso podrían realizar cambios de ***s cada minuto). Pero parece
    ser que eso no les interesa, y prefieren jugar al gato y al ratón.

  2. #2
    Keep believin` Expert
    Join Date
    Jun 2004
    Location
    46.91°N 25.36°E
    Posts
    1,689
    Posts Thanks / Likes

    Default

    Babelfish result:

    ANALISIS OF THE PRESENT SITUATION OF CRACK NAGRA2: This information I hope can clarify something the present state of crack of Nagra2 and the future possibilities of this one: __________________________________________________ __________________________________________ _____ The change of revision of the ROM110 has consisted of the modification of the table of bugcathers of the Eeprom to modify the behavior of some commandos, among them cmd $48 (one of bugs of those cards). Bugcathers is small parts of code that are introduced in eeprom of cards, and which they modify the treatment that occurs to the commandos, allowing to the operator to modify his envio and to operate on them once they arrive at cards. This method to update the revision of cards has been used from the beginning of Nagra1, and serves to resolve errors in the treatment of the commandos (bugs). The present state of cards Nagra2, is similar to which existed with the ROM3/ROM10 at the time of Nagra1. In one first stage of fight against the pirateo they were limited single to change *** s (as we are at the moment), later began with the updates of revisions (modification of bugcathers) extending this during a pair of years, soon the shipment of EMMs with absorbed code, and finally the physical change of cards. Thus they happened but of 4 years where always hackers was able to deceive those protections, since it was had dump complete (ROM, ram and EEP) of cards. Single a simultaneous card change Nagra/Seca (with the fusion of the operator) was able to paralyze the pirateo and to delay but of 6 months the new appearance of the pirate emulators (the present ones). To day of today it is confirmed that dump complete of the ROM110 exists (ROM, ram and EEPROM). That in if already he constitutes a tremendous problem for the operator, since no matter how much the operator does, always it is possible to analyze his actions step by step (revisions) and to discover of that such modifications towards it consist to continue emulating the system. This would become by means of the incorporation of "back doors" (backdoors) in card ROM110. These back doors consist of small codes similar to bugcathers, introduced in the card by own hackers and that allow the re-entry to the card of a fast and safe form but. The own card originally already has a "backdoor" that is used in factory for the recording of bugcathers initial, and that can be used for these aims. Also codes exist blockers in form of bugcathers that are introduced in cards to avoid that the card is closed with one of these revisions. At the moment this confirmed equally that exists to blocker for this assignment, and that would allow to protect the card to continue investigating. Also this confirmed that is had the EMMs which they have been used for the update of the revision of cards (captured of stream of video), reason why these could be used a posteriori to analyze them and to return to emulate the ROM110 the new revision. There is another slope of hack of cards that also can be used for the study; Knowing the totality the parts of the ROM110 (ROM, ram and EEPROM) as they are known, exists what emulation by software is called, that is not another thing that to emulate the card in a PC program. In nagra1 "Counterpart" existed the program that was used as if outside an original card; Him commandos can be sent to the program, and the program answered as if it was the original card (hard). Of this form it can, sending the EMMs of update of revision, to obtain the new EEProm of the updated card, with no need if it wants to have blockers or backdoors. At the moment an adaptation of that program exists also so that _____________________________________________ works with the ROMs present of Nagra2. __________________________________________________ _____ All this information I hope serves to explain, no longer reason why they can count in an u other sides, or by the rumors, if not by the experience of the past and the present knowledge of cards of Nagra, if he is really feasible that the emulation follows ahead with those changes. In my opinion, this emulation will always follow ahead, although depending on the moment that wants it to present hackers (like when they publish *** s, etc). In the last 3 changes of *** s hackers have been fast, and they have published them these hours later (or even before) of being used. We will hope that with new *** s they continue acting equal. It is not necessary to forget either that of cards which they work under Dry encapsulation (v9), it has not even been begun has to speak. And of that other slope of crack they have been heard for a long time information that assure that MOSC exists, and therefore also sufficient information for the emulation would exist (it has perhaps not come to the light to be at the moment unnecessary). What this clear one is that if does not exist physical card change on the part of Nagra2 operator, the pirateo will continue existing. They have always had methods to make difficult so much the pirateo as to make it nonviable (daily changes of *** s for example, and at the moment by the power of cards could even make changes of *** s every minute). But it seems to be that that does not interest to them, and prefer to play the cat and the mouse.
    1.6 Offset Al, Invacom 0.3dB, VBOX 2 Moteck, DVB: Pinnacle PCTV-Sat, act. 18'' , 75°E <> 30°W , DM500s / Focus KSF100 / 2x DigiTV 1160NA / 1x Humax Digi-plus / 0.3dB Gold+0.8m Offset / BOOM TV

  3. #3
    Junior Member Junior
    RDI - Board Default Avatar

    Join Date
    Apr 2006
    Location
    MADRID
    Posts
    6
    Posts Thanks / Likes

    Default SITUATIE NAGRA

    IN PRIMUL RAND CA INCA CEEA CE VEDETI PE AICI SCRIS SUNT DOAR POSIBILITATI.DEOCAMDATA NU E NIMIC FACUT 100%.SPERA SA SE OBTINA CEVA DE MOMENT IN ACEASTA SAPTAMANA.DAR VA FI PTR PUTIN TIMP.NOI DEJA PRIMIM AICI NOILE CARTELE "ALADIN" CARE SE SPERA SA FIE FUNCTIONABILE IN CAM 45 DE ZILE.SE TRIMIT PRIN POSTA ASA CA LE VOR PRIMI TOTI ABONATII REPEDE.STIU DE SAPTAMANA TRECUTA CA AU ATACAT EPROM-UL.DAR DE MOMENT NU A FOST SCOASA SOLUTIA SALVATOARE.CE VA INTERESEAZA TRADUS DIN TEXTUL DINAINTE PTR CA SA-L TRADUC PE TOT NU PREA AM TIMP............
    Nunca es demasiado tarde.

  4. #4
    Junior Member Teacher
    RDI - Board Default Avatar

    Join Date
    Dec 2005
    Posts
    420
    Posts Thanks / Likes

    Default

    @WEBSTAR

    Multumesc pentru informatie. Eu unul m-am cam lamurit...

 

 

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Situatia abonati DTH in Romania (13.12.2006)
    By Fanta in forum DTH & Cable-Romania
    Replies: 41
    Last Post: 21st December 2006, 23:42
  2. Situatia abonati DTH in Romania (24.10.2006)
    By Fanta in forum DTH & Cable-Romania
    Replies: 6
    Last Post: 27th October 2006, 03:49
  3. Replies: 10
    Last Post: 3rd October 2006, 18:56
  4. lista canale actuala Mth
    By adam666 in forum Placi DVB
    Replies: 2
    Last Post: 3rd May 2006, 20:31
  5. SITUATIA ACTUALA A DTH-ului ROMANESC
    By Fanta in forum DTH & Cable-Romania
    Replies: 33
    Last Post: 18th September 2005, 18:15

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Back to Top