home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!walter!att-out!rutgers!usc!cs.utexas.edu!asuvax!ennews!anasaz!john
- From: john@anasazi.com (John R. Moore)
- Newsgroups: alt.radio.scanner
- Subject: Re: ** THE FUTURE OF SCANNING? **
- Message-ID: <1992Nov16.143503.23234@anasazi.com>
- Date: 16 Nov 92 14:35:03 GMT
- References: <1992Nov10.215857.28142@sbcs.sunysb.edu> <1992Nov12.154002.16463@anasazi.com> <1992Nov13.234043.24988@netcom.com>
- Sender: usenet@anasazi.com (Usenet News)
- Reply-To: john@anasazi.com
- Distribution: usa
- Organization: Anasazi, Inc. Phoenix, Arizona USA
- Lines: 43
-
- Keywords:
-
- In article <1992Nov13.234043.24988@netcom.com> feustel@netcom.com (David Feustel) writes:
- ]john@anasazi.com (John R. Moore) writes:
- ]
- ]>the cell site and someone else. Furthermore, if they use encryption similar
- ]>to that used by the VideoCipher-II, GOOD LUCK trying to unscramble it.
- ]
- ]VideoCipher-II is now so compromised that new codes are sent out
- ]monthly just to make more work for the pirates.
-
- There is nothing wrong with the VC-II encryption. The problem is with how the
- boxes are implemented. It would be easy to use similar encryption technology
- with cell phones without them being easy to compromise. For example, using
- THE SAME technology but a unique key per phone would be enough to defeat
- interception.
-
- As far as I know, VC-II encryption has never been broken. What has been done
- is that people have:
- (1) modified the PROMS on the control CPU in order to change the
- tier priviledges (Musketeer chip)
- (2) modified the crypto chip to clone the ID of a valid unit into a whole
- fleet of pirate units. Notice that this requires a significant
- conspiracy.... J Random hacker isn't going to do this. With cell
- phones, you would have to clone the crypto ID of the unit you wanted
- to monitor, but how would you get the ID (hint: in a well designed
- system it would never be broadcast)
- (3) Used the unbonded test lead on the crypto chip to extract intermediate
- crypto data. Modify pirate units to take this info which enables them
- to unscramble the intercepted channels (I am not clear if they are
- able to get the monthly master keys this way or not). Again, no reason
- for this to work on cell phones.
-
- Let's face it, the economics of hacking VC-II's, and the fact that each
- broadcast that could be monitored has millions of possible customers make
- it far different from cell phones - even assuming that the cell phone people
- are stupid enough to duplicate the failures of the VC-II.
-
- --
- John Moore NJ7E, 7525 Clearwater Pkwy, Scottsdale, AZ 85253 (602-951-9326)
- john@anasazi.com ncar!noao!asuvax!anasaz!john anasaz!john@asuvax.eas.asu.edu
- This is a newer version of the memetic .signature infection. Now that's an
- idea. Copy it into your .signature today!
-