Register

Welcome to the RDI-Board Community.

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed.


Donate Now Goal amount for this month: 100 EUR, Received: 100 EUR (100%)
Donate to support this site...

Results 1 to 10 of 10
  1. #1
    Platinum member Expert
    Join Date
    Jun 2004
    Location
    29°20'N 47°59'E
    Posts
    5,711
    Posts Thanks / Likes

    Default


    if it can be proven, then good.......
    HP-Compaq DC5000 MT 1.5GB RAM
    Debian Squeeze with Smargos
    CCcam 2.1.4

  2. #2
    FINISHED&GONE WITH SILENT Expert
    RDI - Board Default Avatar

    Join Date
    Feb 2004
    Posts
    2,675
    Posts Thanks / Likes

    Default

    Quote Originally Posted by anishpsla View Post
    There is an information in Electronics For You, that some claim DISH TV and STAR channels are Hacked. The information is as following.

    Meanwhile, some enterprising enthusiasts claim to have successfully descrambled the CAS channels using SkyBox and TechnoCraft Universal PCI card in conjunction with Tetra auto descrambling method to crack some DISH TV and Star TV channels.

    This information in the Electronics For You Magazine January 2008 Issue Page 16 right side third paragraph.
    Friend what are your comments about this NEWS.
    "Tetra auto descrambling method "?

  3. #3
    Byte Stalker Mentor
    Join Date
    Feb 2004
    Location
    Planet Earth in Universe
    Posts
    939
    Posts Thanks / Likes

    Default

    Encription systems is really a cat & mouse between hackers & encripter! It's an everlasting battle of wits!

  4. #4
    canine consultant Expert
    Join Date
    Feb 2004
    Location
    over the Hill, and down the road
    Posts
    1,318
    Posts Thanks / Likes

    Default

    Yeah, yeah, we've heard it all before, Didn't our SHONKY mate crack it a while ago, Sky systems are the second most secure encryptions out there.

    Chances are some one was playing round, and they switched off the encryption to run some tests, and he got a bit of the FTA transmission. It happens all the time.

    Anyway, Like all things time will tell,
    regards from OZ bassett

  5. #5
    Banned Member Expert
    Join Date
    Apr 2005
    Location
    Coast of Ionian Sea
    Posts
    1,040
    Posts Thanks / Likes

    Default

    i'm not sure about what "TETRA" auto descrambling method it meant on the thread starter but i only heard "TETRA" is meant for Terrestrial Trunked Radio used on mobile radio communication.
    No GUTS!No GLORY!
    .

  6. #6
    canine consultant Expert
    Join Date
    Feb 2004
    Location
    over the Hill, and down the road
    Posts
    1,318
    Posts Thanks / Likes

    Default

    Quote Originally Posted by Zoren View Post
    i'm not sure about what "TETRA" auto descrambling method it meant on the thread starter but i only heard "TETRA" is meant for Terrestrial Trunked Radio used on mobile radio communication.
    I agree,
    and this below confirms what you have said.. I entered TETRA encryptions into Google and came up with the following,,

    TETRA Security

    The area of TETRA security is extensive, as it needs to provide different levels of security ranging from what is acceptable on commercial networks to what is acceptable on a national public safety network. The security mechanisms in the standard are covered through Authentication, Air Interface Encryption (AIE) and End to End encryption. The threats to Confidentiality, Authenticity, Integrity, Availability as well as Accountability are covered with those three mechanisms.

    The standard based services are constantly being expanded by a sub-group of the Association - Security and Fraud Prevention Group (SFPG).

    Mutual Authentication is a service required to ensure that a TETRA system can control access to it and for a radio terminal to check if a network can be trusted. In TETRA, as in most other secure systems, authentication is the basis for much of overall network security and can also be used to ensure validated billing in public access systems, and can provide the foundation for a secure distribution channel for sensitive information such as other encryption keys. The mutual authentication security mechanisms protect both Voice and Data services.

    The TETRA standard supports four AIE TETRA Encryption Algorithms (TEAs), these being TEA1, TEA2, TEA3 and TEA 4. There are differences in the intended use and the exportability of equipment containing these algorithms. For example, TEA2 is intended for use by public safety users in Schengen and related European countries only; the others have wider applications ranging from general commercial use to public safety use in regions where TEA2 is not used. The main benefit of over the air encryption is that it protects all signalling and identities as well as user speech and data. This provides an excellent level of protection from traffic analysis as well as from eavesdropping. The encryption system is closely bound to the TETRA signalling protocols and the algorithms can (if desired) be implemented as software within radio terminals and base station equipment, instead of using encryption modules, which could consume space and increase cost.

    The TETRA standard also supports End to End encryption using a variety of encryption algorithms as deemed necessary by national security organisations. The TETRA Association Security and Fraud Prevention Group has extended the work carried out in the TETRA standard to define a general framework for the incorporation of End to End encryption. Recommended sample solutions have also been provided for the International Data Encryption Algorithm (IDEA) algorithm (IPR owned by Ascom) and the newer Advanced Encryption Standard (AES) algorithm (IPR free), which benefits from a larger cryptographic algorithm block size. Custom and indigenous algorithms are also possible with End to End encryption, although these are not recommended for air interface encryption due to their need for integration in signalling protocols and availability of standard compliant terminals.

    Besides these core security capabilities TETRA can also support a wide range of security management capabilities such as those used to control, manage and operate the individual security mechanisms in a network. The most important of these is Encryption Key management, which is fully integrated in TETRA standard functions. Even though security functions are integrated in a network this does not automatically imply that a network is fully secure. However, what is normally achieved is that the security risks are “condensed”, that is they are concentrated to specific elements in the network, which can be adequately controlled.

    A more detailed and comprehensive PDF document describing TETRA Security can be downloaded by ‘clicking’ TETRA Security

    http://www.tetra-association.com/tetramou.aspx?id=1184

    Also this,,

    TETRA
    With over ten years experience in the public safety and Homeland security markets, who else would you turn to for reliable, proven, standards compliant TETRA, TEDS and DMR/dPMR technology? We understand trunked radio.

    http://www.etherstack.com/
    regards from OZ bassett

  7. #7
    Junior Member Teacher
    RDI - Board Default Avatar

    Join Date
    Apr 2003
    Location
    Malaysia
    Posts
    226
    Posts Thanks / Likes

    Default Moral Of The Topic?

    Seeing Is Believing.

  8. #8
    SATELLITE GURU Expert
    Join Date
    Mar 2004
    Location
    Bletchley Park Code Breaking Lab
    Posts
    2,521
    Posts Thanks / Likes

    Default

    Quote Originally Posted by anishpsla View Post
    Hai, friends are you think actually Diah tv and TATA Sky hacked In my knowledge, no one can hack Videoguard. And also Conax have very lengthy key. Also very hard to hack. TATA Sky using videoguard and Conax is used by Dish Tv. Are you think actually both are hacked Please post your idea about it.
    I think many things are possible..... Dish TV and TATASKY are already on the menu...

    If Evolution works, why so many idiots?


  9. #9
    canine consultant Expert
    Join Date
    Feb 2004
    Location
    over the Hill, and down the road
    Posts
    1,318
    Posts Thanks / Likes

    Default

    And like everyone else Jim, your paying for them.

    but it does beg the question , which version of vidioguard has been compromissed, it's simply a matter of flicking the switch, and the hole structer of the encryption can be changed.
    regards from OZ bassett

  10. #10
    Banned Member Expert
    Join Date
    Apr 2005
    Location
    Coast of Ionian Sea
    Posts
    1,040
    Posts Thanks / Likes

    Default


    some say
    "N3 has more chance of being compromised than NDS"
    but what i've read its purely "hearsay" and "who knows when"
    No GUTS!No GLORY!
    .

 

 

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Back to Top