home *** CD-ROM | disk | FTP | other *** search
-
- Sat-Fax
-
- ---------------------------------------
-
-
-
- ---------------------------------------
-
- INTRODUCTION
-
- ---------------------------------------
-
- SAT-FAX is an uncopyrighted, mostly
-
- unoriginal magazine dedicated to the
-
- unauthorized reception of Video Cipher
-
- scrambled programs.
-
-
-
- Intoduction to the Video Cipher //:
-
-
-
- The Video Cipher // was formerly distributed by
-
- M/A com, but now is distributed by general
-
- instraments. The video cipher utilizes a
-
- National Security Agency "p king U.S. security
-
- regulations. M/A com & GI have apparently
-
- notattempted to bring suit against anyone
-
- involved in scramble busting technology, but most
-
- lawyer ught using a scramble defeat system in
-
- their homes can be prosecuted. Those are the
-
- 'rules'...now the facts:
-
-
-
- :::::::::::::::::::::::::::::::::::::::
-
- descrambling techniques
-
- :::::::::::::::::::::::::::::::::::::::
-
-
-
- 1)Cloning: Researchers have discovered a way to
-
- force VC2000(video cipher 2) out of a unit
-
- through U30. Unit internal ID code is forced out
-
- into an external m oning chip which is attatched
-
- briefly to a U30 chip in a second (and third,
-
- etc..) Videocipher units. In plain English, the
-
- authorization number is copied from ciphers, and
-
- the other one will also be authorized. The
-
- obvious problem, though, is that you have to find
-
- a sucker who will buy the services.
-
-
-
- 2)CLOWNING-TWO: Researchers are offering consumer
-
- packaging in Vancouver, BC (604-684-9625) which
-
- removes authorization matching from internal
-
- memory devices, a u have to pay a "service fee"
-
- to get the chip replaced each month. The
-
- assumption is that this method works like cloning
-
- one, but the point has been reached wh less
-
- expensive than full subscriptions though.
-
-
-
- 3)TIERING: To me, this seems to be one of the
-
- best descrambling services acailable to day.
-
- Researchers have uncovered a way of extracting
-
- authorization key thr . In plain English: You
-
- just pay for one channel, and you recieve every
-
- other one (Movie channel, Select TV, HBO, Viewes
-
- Choice, etc..)
-
-
-
- 4) Clocking: This is another succsessful way of
-
- descrambling, maybe even better than the method
-
- mentioned above. This method of descrambling
-
- ignores the satel data is required for
-
- descrambling. By substituting ther own clock,
-
- derived from the one in the Video Cipher, 14.3
-
- (etc..) MHz crystals. This is nick named th
-
- 5) RECREATING: The Videocipher utilizes several
-
- key IC components to descramble signals. This
-
- group (Unnamed for legal reasons) has designed a
-
- stand alone des dio, program ratings, etc...).
-
- Recently newly available chips, such as Plessey
-
- Mv1812, which unlocks key hamming code functions
-
- in VC2000 device U28, have made
-
- 6) 0000: This may be the mos exotic and probably
-
- the most threatening approach to beating Video
-
- Cipher. Cable system units are addressed
-
- seperate from home un cally picked off by
-
- decoders so this data stream caused the decoder
-
- to ignore all of the individual unit adressing in
-
- the data stream, by modifying this softwa ed
-
- within an individual service, the vc2999 is
-
- preprogrammed to decode all 56 tiers possible,
-
- with EVERY service. In this service, if you ask
-
- the descrambler f
-
- 7) A LEGAL WAY OF RECIVING THE PICTURE
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-
-
- The method of descrambling the picture I will
-
- mention here is, to my knowledge, perfectly
-
- legal!. Currently, there are "Dealer Demo Chips"
-
- available. These wi vertizing the movie
-
- companie. To get rid of the box, you must design
-
- a circut to repeatidly issue the Vie command to
-
- you Videocipher. The design will be inclu
-
- ***************************************
-
- Random Facts
-
- ***************************************
-
-
-
- -There are only 50,000 VC 2000s in homes, so the
-
- market is too small to attract "Big Players" yet.
-
-
-
- -Software solutions, some "Elegant" in their
-
- simplicity are M/A Com-GI correctable if they
-
- "Purchase" knowlege needed to close their
-
- software holes
-
-
-
- -Hardware solutions,not so simple, nor elegant,
-
- are themselve 'copyable' and designers are
-
- finding a hard time in protecting their designs
-
- from unauthorized use
-
- -Fear of getting caugt up with is keeping, and
-
- will keep, most sellers outside of the U.S.
-
- Those setting up distribution in Canada or the
-
- Carribian are trying
-
- -Fear of personal reprisals has also affected
-
- visibility of those who have created successful
-
- techniques.
-
-
-
-
-
-
-
- *A useful program to watch is the Boresight
-
- network, on Westar 5, transponder 1, at 9:00 PM
-
- eastern standard time. (Thursdays)
-
-
-
-
-
-
-
- ***************************************
-
- THE END
-
- ***************************************
-
-
-
-
- DOWNLOADED FROM P-80 SYSTEMS.....
-
-
-