Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Pirate decryption
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Internet key sharing == {{Main|card sharing}} An Internet key sharing scheme consists of one smart card with a valid, paid subscription which is located on an Internet server. It generates a stream of real-time decryption keys which are broadcast over the Internet to remotely located satellite receivers. Limiting factors in the number of remotely located satellite receivers are the network latency and the period between the updated keys and the ability of the card client's receiver to use the decrypted key stream.<ref>{{cite web|url=http://www.openu.ac.il/personal_sites/tamirtassa/download/conferences/dtt_conf.pdf|title=Dynamic Traitor Tracing|first1=Amos |last1=Fiat|first2=Tamir|last2=Tassa|publisher=[[Tel Aviv University]]}}</ref> Each receiver is configured in an identical manner, a clone receiving the same television signal from a satellite and, from the internet server, the same decryption keys to unlock that signal. As the server must have individually subscribed smart cards for each channel to be viewed, its continued operation tends to be costly and may require multiple subscriptions under different names and addresses. There is also a risk that as the number of card clients on the card sharing network grows, it will attract the attention of the satellite TV service provider and law enforcement agencies and the monitoring of IP addresses associated with this card sharing network may identify individual users and server operators who then become targets for legal action by the satellite TV service provider or by legal authorities. Key sharing schemes are typically used where replacement of compromised smart card systems (such as the deprecation of Nagra 1/2 in favour of Nagra 3) has made other pirate decryption methods non-functional. In February 2014, an episode of [[British Broadcasting Corporation|BBC]]'s "Inside Out" disclosed that the complete [[BSkyB|Sky TV]] package could be obtained from black-market sources for as little as Β£10 per month through Internet key sharing, [[Swansea]] and [[Cardiff]] were highlighted with significant activity in pubs using cracked boxes to show Premier League football.<ref>{{cite news|url=https://www.bbc.co.uk/news/uk-england-london-26052012 |title=Pirated Sky TV sold for Β£10 a month |work=BBC News |access-date=October 15, 2015}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)