Jump to content

Talk:Pirate decryption

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Jmccormac (talk | contribs) at 19:03, 17 February 2014 (Limitations of Internet Card Sharing). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Limitations of Internet Card Sharing

The changes to the article by @Notwillywanka were reverted because the number of clients on a card sharing network is limited by a number of practical considerations. The most obvious limitation is that the card clients have to have a receiver capable of using the key stream. There is a limit to the number of possible receivers or clients on a card sharing network due to the latency of the network (the time taken for the data from the server to travel to the receiver) and the period between the updated keys. If the latency is greater than the period between the updated keys, the receiver/decoder (IRD) will miss a key and the signal may become encoded again. The decrypted key has to arrive within a specific timeframe and if the latency causes it to miss that window, the IRD will lose lock and stop decoding the signal. With large ISP networks, it may work well but on high-latency or poor connections, it will not be as effective and the signal on the IRD will stop being decoded if it misses too many keys. A related factor is that as the size of the card sharing network grows, the probability of detection increases. If the number of card clients on the card sharing network is high enough, then the Pay TV providers or law enforcement agencies may identify the network and neutralise it (either by identifying the cards being shared, or by identifying the operator and customers and taking legal action). Thus it is often in the best interests of the card sharing network operator to limit the number of clients on one card sharing network. In theory, one card can run a country's decoders however the real work practicalities make that difficult. Jmccormac (talk) 01:14, 15 February 2014 (UTC)[reply]

the limitations listed above do not affect the number of potential "subscribers". Just like a. Radio station can transmit to an unlimited number of roadios, a card sharing system can broadcast to an unlimited number of authorized receivers. It is not like viewing a web page, where each viewer has to open a connection and then wait for a response, where timing is an issue, but it is a constant stream that the authorized receiver listens. Into for the key. No limit as to how many can listen in, therefore unlimited. Bandwidth, latency, are factors in setup, and costs, but are all able to be easily overcome, limits are chosen by operators, not imposed by any ability. — Preceding unsigned comment added by Notwillywanka (talkcontribs) 23:06, 15 February 2014 (UTC)[reply]

The number of receivers capable of using the key stream is the upper limit (both theoretical and practical) for any card sharing network. To explain it in terms of your radio example, if there is a finite number of radio receivers, then the number of radios capable of receiving the radio broadcast from your radio station is finite and therefore limited. External conditions limit the size of card sharing network. If N is the number of receivers capable of using the key stream then the number of possible receivers in a card sharing network is always going to be less than or equal to N. Jmccormac (talk) 02:30, 16 February 2014 (UTC)[reply]

There is no finite number of radios that can be used, or made, no limit exists, the fact that there is a finite number of radios in existence does not limit the potential number of radios that can receive a signal. There is no upper limit to how many receivers are capable of receiving the key stream, every new receiver that is built can receive the stream, just like every new radio built is able to receive the radio signal, regardless of how many already are receiving the same signal. — Preceding unsigned comment added by Notwillywanka (talkcontribs) 16:38, 17 February 2014 (UTC)[reply]

Obviously you haven't much of an understanding of this particular hack and the simple mathematics behind it. You seem not to understand the limitations of a card sharing network. The number of clients in a card sharing network is limited to the number of devices that can use the key stream. This immediately sets an upper limit (N) on the maximum size of a card sharing network for any Pay TV service or operator. The size of a card sharing network is not unlimited. It is a finite number represented by the number of devices capable of using the key stream and the number of devices is not infinite. At any given time, the number of devices is finite (devices are built, devices fail and people even stop using them). That is a finite number. It really is that simple. Jmccormac (talk) 17:43, 17 February 2014 (UTC)[reply]

Real, easy, there is no actual limit as to how many CAN use. The number in existence is not a limit. Do some simple research, take time to think about it, just because there are a finite number of things at the moment, it does not limit the possible number that can exist. You seem to be confusing unicast with multicast. Unicast sends a seprate copy to each device, multicast sends one copy that ANY subscribed device CAN listen in to, NO UPPER LIMIT as each device just listens in, regardless of how many devices exist or not, more devices CAN be added, created, removed, but there is NO LIMIT. — Preceding unsigned comment added by Notwillywanka (talkcontribs) 18:20, 17 February 2014 (UTC)[reply]

You obviously don't understand what is going on with this particular hack. There is a hard limit for the number of clients in a card sharing network and that is dictated by the number of devices capable of using the key stream. It is quite evident that you haven't done any research on this and are just pushing your opinion as fact. At this stage it your insistence on pushing your unsubstantiated opinion as fact is turning into an edit war and may require an RFC or Admins noticeboard report. Jmccormac (talk) 18:40, 17 February 2014 (UTC)[reply]

Moving problem section to talk for editing discussion

This is the problem section with the section on limits modified:

The limiting factors in the number of possible remotely located satellite receivers are the network latency, the period between the updated keys and the ability of the card client's receiver to use the decrypted key stream. The theoretical maximum number of clients, at any given time, in a card sharing network is limited to the number of client devices, typically Integrated Receiver-Decoders, capable of using that key stream to decode the encrypted satellite TV signal.

Each receiver is configured in an identical manner, a clone receiving the same television signal from a satellite and, from the internet server, the same decryption keys to unlock that signal. As the server must have individually subscribed smart cards for each channel to be viewed, its continued operation tends to be costly and may require multiple subscriptions under different names and addresses. There is also a risk that as the number of card clients on the card sharing network grows, it will attract the attention of the satellite TV service provider and law enforcement agencies and the monitoring of IP addresses associated with this card sharing network may identify individual users and server operators who then become targets for legal action by the satellite TV service provider or by legal authorities.

The first section now reflects the reality of a card sharing network. As there is a card sharing article, it might be unnecessary duplication of information and the brief pointer might be sufficient for this article. Jmccormac (talk) 19:03, 17 February 2014 (UTC)[reply]

Merger Proposal

There's a lot of overlap between this article and Smart card piracy. Lunchboxhero 19:57, 4 September 2007 (UTC)[reply]

Agreed, I believe that they should be merged. It would also be nice if a reference to Black Sunday 2001 would lead to this article. Str8lazy (talk) 23:36, 25 July 2008 (UTC)[reply]

NPOV dispute - Technical issues

I'm disputing the neutrality of this section due weasel words, and the following passages:
"In theory the system was an ideal solution" Ideal how, and in in whose opinion?
"In some cases, fraudulent cloning has been used..." This references a non-existing article and gives no explanation of what makes the cloning fraudulent.
Also:
"A scheme ... has been widely promoted by some unscrupulous individuals as a means of disabling communication of billing information for pay-per-view programming but this device is effectively worthless..."
I see no reason why the unnamed individuals should be described as unscrupulous, or why the described device should be labeled as effectively worthless, except for the author to express value judgements. I recommend identifying the individuals referred to, refrain from describing them as unscrupulous, and factually describing the technical shortcomings of the device.Bigpinksocks (talk) 16:52, 2 December 2012 (UTC)[reply]