Chris e cel care l-a bagat pe Kudelski in kkt cind a facut public algoritmul Nagra 1.
Mergeti pe site-ul lui sa vedeti ce face.
Evident ca pentru o suma va citi si cipul de Nagra 3 sau poate .... pe cel din conserva Globecast si va afla boxkeys. Nu se stie niciodata!
Despre lawsuit pe altadata dar e disponibil pe net; daca sinteti interesati sa vedeti ce face Kudelski ca sa iasa din kkt.Code:PAID ACCESS SYSTEMS. A key witness in the court case opposing the Swiss group against the media giant News Corporation was passing by in Amsterdam, attending a conference on computer piracy. We met him. François Pilet, Amsterdam Saturday, March 29 2008 The audience is glued to the lips of Christopher Tarnovsky. In front of a podium of hackers and security specialists - with an average age of 25 - the self-taught electronics specialist revealed the techniques that allow him to break open chip cards that block access to pay TV chains in the whole world. The scene takes place in the Mövenpick hotel in Amsterdam, where the European edition of the Black Hat conference was held Thursday and Friday last week. This is one of the prime professional meetings dedicated to computer piracy. Among the twenty or so speakers invited to this big get-together, Christoper Tarnovsky talked for more than one and a half hour in the "Lausanne" room - a sign of destiny (Tr. note: Lausanne is a Swiss city close to the headquarters of the Kudelski Group). Employed by NDS The 39 year old American is accused of having been recruited in 1999 by the Israeli company NDS, a competitor of Kudelski, to break the security codes of Canal+ (French Pay TV) and publish them on the Internet, and to have repeated the operation, to the detriment of the Swiss group and its clients. The publication of these codes allowed hundreds of thousands of savvy users to access encrypted TV channels without paying the subscription fees. The American satellite TV company Echostar also uses Kudelski cards to protect their content. They confirmed having lost hundreds of millions of US dollars due to these pirate activities and demand one billion US$ of damages from NDS, a subsidiary of the media group News Corp. This April, Christopher Tarnovsky will take the witness stand in a California court in defense of NDS, his employer for ten years following 1997. According to him, Kudelski and Echostar have wholly invented the conspiracy they claim having been victim of in order to mask the weakness of their encryption. In his eyes, the case against NDS is nothing short of an extortion attempt. "Sure, I've broken the cards of Kudelski", he annoyedly states. "I was paid by NDS to do it. This is an activity that all companies in the trade do. But why would I have published these codes on the Net for free? I am not stupid, and I never had the intention of taking that risk." Having become an awkward asset, Tarnowsky is no longer employed by the group since a year. He started his own company, Flylogic, through which he offers his know-how to electronics manufacturers, to test the resistance of new products to pirate attacks before they are launched. Christoper Tarnovsky details the general weakness of systems based on certain chips designed by a handful of companies like Motorola and Infinenon (sic), systems used in products as divers as garage door remotes, car alarm systems and TV decoders. "Unbreakable? That's wrong!" "The manufacturers of semiconductors claim that their chips are unbreakable. The companies integrating them into their products trust the specifications they obtain. They believe that their secrets will be well kept. That is wrong, of course." He showed pictures of his laboratory, set up with second-hand equipment worth a couple of thousand dollars. The centerpiece is a powerful Zeiss microscope to access the heart of the chip, where the precious codes are hidden. Successive layers of silicone are peeled away, using acids and lasers. The engineer then explains how he takes over control of the card by short-circuiting one by one its protections with long microscopic needles. It takes a few minutes for the weakest of them, a few hours for better designed chips, but the content of the card gives in to these attempts 9 out of 10 times. For such an operation, Flylogic bills "about 30'000 dollars". When questions were taken, a voice is heard from the end of the room. A Microsoft engineer is wondering: "Did you take an interest in the processor of our Xbox360 game console?" - "I was offered 100'000 dollars to break it", says Tarnovsky. "But I replied that that wasn't enough." "They didn't invest enough" The next question comes from an Estonian journalist. His country, forerunner of cyberdemocracy, has introduced a chip-containing identity card, which can be used for e-banking, as well as online voting. "It's a Motorola", sneers Tarnovsky. "An old model, badly protected." What about the Kudelski cards? A short embarrased silence before his reservations disappear: "Sorry: The last two generations were broken. The next one will be, as well. They did not invest enough into research in the last ten years. Today, Kudelski is running out of money, look at their stocks. They hope to reestablish themselves with this lawsuit, but they will lose."
There are currently 1 users browsing this thread. (0 members and 1 guests)