New encryption system nagra3 open

If you read the top of the file there is some info regarding rom 152 which is what D+ uses I think but the rest is Nagra 2 stuff.

No its a direct rip off!! On the bit of the original document its Rom102 - the only change is swapping the 0 for a 5 to make it say 152 !! Other than that its exactly the same!! Ive added it so you can compare!!
 
well, at least it shows that there is demand for nagra 3 to be busted open, :)
 
I believe it has been done to some extent anyways and as usual we are likely to see it on the Diablo cams first when it is released.
 
I think if there was a viable hack for it they would have capitalised on the xmas spend and got it out before now !! Especially as we now have Cabo- D+ - Premiere - Polsat all using N3 there is a big market out there for a solution!!! Once the US gets implemented I expect more results mainly due to the massive demographic which means there is more potential profit available for a hack!! They will be willing to invest more upfront to get a working hack!! Plus we know a certain company would love to discredit Kudleski .....again.....
 
...... Plus we know a certain company would love to discredit Kudleski .....again.....

Problem is, if N3 is compromised so early in its life cycle then the providers will dump it, probably in favour of NDS and there aren't may that really want that to happen so you could say that there's an almost vested interest in making sure that any N3 hack remains small and well away from the mainstream !
 
I suppose that will be the clinching factor to whether the hack is a corporate job or a private one - corporate hack would be leaked everywhere for free for just the reason you mention above!! A privateer hack would probably appear on an expensive card/cam - !!



....when i say "private" I just mean a private group, indivudal etc as opposed to a commercial espionage style hack!!
 
well there is a work around for one group of cards of n3 and also talk of one more to come i would say its well hacked but as nozzer says it needs to be keep back the last thing people need is a full nds take over and im sure nds would love this maby see them leak the hack as has been done before , lot of people saying when the states go full n3 thats when it will happen but would be nice for this one to stay closed for a while so nds dont get any more net works under there sleaves
 
ok i know that we are onto n3 now but is nds still the same one it has been for a while or has it been updated to newer versions?
 
there was post some were that a new card was to come but with no pub hack of what they are running now why rush unless c/s is doing there heads in but i cant see it being that much of a pain as joe blow in the street dose not want to work with the likes of a dreambox no matter what it gets you
 
if n3 does get hacked and thy o move over to nds would it be such a bad thing.i mean for the long term?No i think as everyone would be working on hacking there system and im sure it would cum quicker than u think.
 
Some interesting news regarding Nagra 3.


its important to all members in herre


this is just C/P

Trying to answering the N3 question.

I will try and answer this question so many of you want to know, and do this as intelligently and in layman’s terms the best possible way I can so many of our members can understand it. Now I will only uses a few abbreviations in this post so that many of our newbie's can understand what I mean, I will uses this many times (N/A) meaning; North American Market.

Now to start with alot of rumors of coders waiting n3 is fully activated into the stream from each uplink transmission center owned by echo star Inc. I and many others’s underground believe this is false. The only reason all coders working in the FTA industry now have not introduced new codes for any FTA unit now is because they have nothing to work with. None of the n3 encryption information they need have been given to them as of yet. Why?

Well because until a (hacker) or a (group) of hacker's crack's the (G3) card used here in N/A the coders will not even be able to start to write any codes.

Question; so how long will it take?
I wonder; well the question really is will the information be leaked as it was before? Good question and I guess that might depend on how much money one or more companies are willing to pay. Or if the info could or will be leaked out again, and if! And I say this is every unlikely as the (SI) department is watching and guarding this info with their lives.

And might even kill to keep it!
It possible it will never be leaked out, or cracked in the next two years. Why so hard? n1 and n2 were hacked? Why not n3?

Now the best answer to that is because of past (hackers) themselves, the number #1 in Europe has been hired by the company that owns the makers of nagra3 encryption system.

Who is that you ask? Well let’s uses alittle history to answer these questions.

He is Chris Tarnovsky the founding member of the (Black Hat's) a German hacker group that showed many of the worlds hackers just how to break into the security systems of the cards themselves. And now he has been hired by the same company he hacked before, and you know the first thing they wanted to know is (How he hacked their cards).
And what could be gone to (stop hackers) in the future, this is one every good reason hackers in Spain/England and the Eastern Block's have not been able to break into the new Video Guard/Europe codes for the last two years now.

Now then video guards codes used in Europe are different than the codes used here in the states with ***/dn, but the info needed still remains the same. NDS took 6 months (trying) to break into the n2 cards themselves it was until tarnovsky was paid 6 figures that he broke the cards down in less than a week, which blew away NDS big-time. After that all the info needed was gotten from the cards used in a month and coders then used the MAPCALL codes to write the bin files needed. This took about 5 to 6 months to complete. Now coders have several more tools to use in writing codes, this makes it alot faster and easier to write codes now, this is why we have new bin files released in matter of hours not month's or week's nor even days. Most files today are wrote on a complier within minutes and released to the general internet of (broadcaster) within 2 to 4 hours.


Now let me give you alittle history lesson "Rupert Murdoch" owns dtv and (NDS) a subsidiary of the media group news corp. a company setup for the purpose of hacking dn n2 cards, setup in 1999 this in Israeli for the purpose of hacking and releasing the codes over the internet. Why?

Well because he and "Charlie Ergen" the owner of DN tried to merge both their companies twice once in 1997, and again in 2000 and the FCC forced them to stay apart. Why? Because of what many call "Capitalism” or we might call "free market". Guess the government was afraid they would have something called a "MONOPLY" yelpers just like the game, where one company rules the whole industry all over the N/A market. Like the steel industries where in the 1880 here in the US before the feds hacked them apart into alot of little company’s so they could not control the whole north American market and set prices to whatever they wish.

Now since dtv and dn have been in a lawsuit since 2002, which is just now in a federal court in California last month over this very subject. Dtv and dn have been fighting between there selves. This is back to the reason Dtv hacked and released the n2 codes to stab dn right in the back. Why? Well because Rupert Murdoch does not want DN to have a greater market share of satellite tv industry in the US and that pretty much says it all.

Now back to who writes Nagra codes? A company called Kudelski Group owns *********** they are the producers of the Nagra 3 codes, and have invented all 3 of the Nagra codes used in the N/A market since dn/echo star started in the US.

Now what’s been going on in the past week?
Well since Christmas week (all) DTH Satellite uplink centers have been broadcasting both codes at the same time, yes n2/n3 codes. This has some good points to it, meaning that each new (G3) card has both accesses (CW) both (public) and (private) codes for both sets of encrypting the EMMs and CAMs. Coders can use this very small amount of known information to help start a solution on coding eliminators or better known as (FTA) Receivers.

Although I'm absolutely positive that until the private (CW) codes are known the coders are not going to be able to current vent the security encryption of Nagra 3 unless the hackers are successful in peeling away the 3 extra layers of silicone security chips using a powerful electron microscope and several different acids and lasers first until they get to the final precious bottom 3 layers of the Kudelski chip where all the precious codes are hidden. This is the part where only the best hackers (engineers) have the ability to do this type of work.
So please members do not think for one minute that any “back yard” computer “guru” hacker can break this type of security system, I’m sorry it just ain’t going to happen. EVER
So what some of us do know is that without Chris Tarnovsky techniques that allow him to break open chip cards that block access to pay TV chains the whole world would still be without paid satellite tv. Is there hope for us yes! ofcourse it is always possible out of the hundreds of labs setup in different countries hackers are working on this problem now.
But remember they have to have several things, first access to (G3) cards, unissued cards open and clean meaning; cards that have not been imbedded with maintenance access codes, and user access codes used to track the customer uses of this system, PPV Events, PPV Movies, Porn and so on. This is very important and requires someone from the inside of the manufacturing department, of the (SI) department itself. But this is not likely to happen with that amount of screening done by the company’s for their personal. And that each person has to allow the company into their lives, banking records, and life styles.

So how long will it take before any group of coders have a fix for n3, well depending on the amount of info on the new (G3) cards they might have to run on a complier for several days, or using (banks of compliers) for several weeks. It’s still unknown the amount of new process in the map codes used on these new chips. Estimate run all over the place so nobody actually knows for sure, best guess is 6 months to a year before the info needed becomes a new file for release.

So what is the FTA manufacturing doing about this?
Some are still under lawsuits now brought by echo star and dn and may not be doing anything at all, but again it is possible some have already hired hackers or paid hackers to break into the G3 encryption systems and this is where we are now. And I would bet you a hundred to a dime that’s a 1000+1 odds that “if and when these codes” are broken and released on the internet we all will know it the same day. And on that day I bet the coders will start working on the solutions to n3 problem A.S.A.P

So until the whole of the internet is busting out with this info "HACK" we will be in the dark. That’s just a fact of life.
Whether this is good news or bad doesn’t matter to me, it’s just the truth about where we stand right now.

I hope this has atleast help explain things alittle more "this is not a rumor" nor perdition of any kind just facts you all need to know. And the last information I can post this week. As I will be in the hospital in on friday for some tests.
Written by: 0dd Thomas
 
WOW cracking post sakiblateef the translations a bit iffy but very enlightening
 
I think there's a little disinformation in that story !

While undoubtably clever, Tarnovsky was not a miracle worker and would not of got anywhere if he hadn't been fed a Nagra rom dump and chip details which allowed him to analyse the code for holes.

Where the rom dump initially came from is a matter of great speculation although it is suspected that it may of originated from within NDS's Israeli research lab. Regardless, it certainly originated somewhere that has the ability to open a chip by peeling back its various layers and micro-probing.

Any idea's that any of these cards have ever been cracked by people playing with glitchers etc is pure myth. Its all done by big money !
 
Hackin cards the Chris Tarnovsky way.....simple:FRIGHT:

[ame=http://www.youtube.com/watch?v=tnY7UVyaFiQ]YouTube - How to Reverse-Engineer a Satellite TV Smart Card[/ame]

The guys a genius lol
 
hi to all,
i think it will take some time for nagra 3 to open in the near future if it
open it will come with a new cam or card on commercial basis.
 
Regardless, it certainly originated somewhere that has the ability to open a chip by peeling back its various layers and micro-probing.

Any idea's that any of these cards have ever been cracked by people playing with glitchers etc is pure myth. Its all done by big money !

Very interesting.
I used to work for a research institute where we would reverse engineer IC's for major semiconductor companies.Legally of course.
Its a patent minefield.
Stripping the IC is pretty crude stuff,lots of acids and sonic baths involved.
All of the stuff Tarnovsky shows in that video is basic procedure.
Perhaps I should have stayed there ,could have worked late and I'd prob have cracked Nagra 3 by now,lol
 
Last edited:
Are hackers really working in these things? There are so many other products to hack that can be far more lucrative far quicker are we really gong to get more hacks such as for N3, or indeed N£S?
 
Back
Top