Jump to content

Talk:Pirate decryption

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Jmccormac (talk | contribs) at 01:12, 15 February 2014 (NPOV dispute - Technical issues). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Merger Proposal

There's a lot of overlap between this article and Smart card piracy. Lunchboxhero 19:57, 4 September 2007 (UTC)[reply]

Agreed, I believe that they should be merged. It would also be nice if a reference to Black Sunday 2001 would lead to this article. Str8lazy (talk) 23:36, 25 July 2008 (UTC)[reply]

NPOV dispute - Technical issues

I'm disputing the neutrality of this section due weasel words, and the following passages:
"In theory the system was an ideal solution" Ideal how, and in in whose opinion?
"In some cases, fraudulent cloning has been used..." This references a non-existing article and gives no explanation of what makes the cloning fraudulent.
Also:
"A scheme ... has been widely promoted by some unscrupulous individuals as a means of disabling communication of billing information for pay-per-view programming but this device is effectively worthless..."
I see no reason why the unnamed individuals should be described as unscrupulous, or why the described device should be labeled as effectively worthless, except for the author to express value judgements. I recommend identifying the individuals referred to, refrain from describing them as unscrupulous, and factually describing the technical shortcomings of the device.Bigpinksocks (talk) 16:52, 2 December 2012 (UTC)[reply]

Limitations of Internet Card Sharing

The changes to the article by @Notwillywanka were reverted because the number of clients on a card sharing network is limited by a number of practical considerations. The most obvious limitation is that the card clients have to have a receiver capable of using the key stream. There is a limit to the number of possible receivers or clients on a card sharing network due to the latency of the network (the time taken for the data from the server to travel to the receiver) and the period between the updated keys. If the latency is greater than the period between the updated keys, the receiver/decoder (IRD) will miss a key and the signal may become encoded again. The decrypted key has to arrive within a specific timeframe and if the latency causes it to miss that window, the IRD will lose lock and stop decoding the signal. With large ISP networks, it may work well but on high-latency or poor connections, it will not be as effective and the signal on the IRD will stop being decoded if it misses too many keys. A related factor is that as the size of the card sharing network grows, the probability of detection increases. If the number of card clients on the card sharing network is high enough, then the Pay TV providers or law enforcement agencies may identify the network and neutralise it (either by identifying the cards being shared, or by identifying the operator and customers and taking legal action). Thus it is often in the best interests of the card sharing network operator to limit the number of clients on one card sharing network. In theory, one card can run a country's decoders however the real work practicalities make that difficult. Jmccormac (talk) 01:12, 15 February 2014 (UTC)[reply]