Dss hack




















So edgy and esoteric but this was generally the consensus at the time in this scene. So much cypherpunk! Costs were funded by mostly private advertising, Google Adsense, and some merch sales, and the whole thing was run by a dozen or so dedicated volunteers.

We eventually had private areas of the website too but the only way to gain access was to prove yourself worthy to the community by earning reputation points. Overall it resulted in a very strong community known for providing quality tested files and discussion about all manner of DSS esoterica.

But of course just when I was starting to be able to turn a small profit with this hobby and quit my shitty IT job, the courts had to go and make everything completely illegal.

Right at the top was Malaysia. I moved to Kuala Lumpur in early carrying two Dell PowerEdge servers and whatever I could fit into some black duffel bags. It was a bit surreal sometimes. In Vancouver I had a company auction off everything else I owned and send me a cheque they ripped me off.

In the weeks before I moved I was upfront about the nature of the website with many companies by email but the only ISP that would give me service was a scrappy startup called webservers. At the time they were just a few guys in a small office in KL. So they arranged to get me into Cyberjaya , one of the best data centres in SE Asia. Here I am on the right loading my machines into a rack in So this lead to a brief dark period where there was nothing to do but bitch and complain.

The Nagra 2 cards were a huge improvement over the previous generation. These cards could support much more complicated math and had onboard cryptography coprocessors. Luckily someone had managed to glitch into early versions of them and this lead to a full dump of a card.

This signalled a really interesting period whereby users used completely legal overseas FTA free-to-air devices by companies like Pansat, Viewsat, Coolsat, and reprogrammed them to decrypt the signal.

It was essentially a feeding frenzy of free TV and if you were there you likely really enjoyed it. This change annoyed the hobby guys us included and many of them stopped contributing to the scene. Also during this period much of the larger community forums had been shut down by law enforcement. I had managed to forego this happening to myself by moving my operation overseas and being super careful, but I also knew eventually my number would be up.

I revamped our files section during this period and we quickly became one of the core places that released FTA files and fixes faster than anyone else. However by actually hosting the files I was taking some significant legal risks — and I knew it.

Being worried someone would break my door down, even in Asia, was a daily concern. DSSTester revamped files section some time in Some people I knew of or even worked with were put in prison during this period with long sentences and hefty fines. Little did I know I was on the radar by the guys at Signal Integrity around and was about to get a very scary email from Google. Okay now pay attention to how this unravels because you can learn an important lesson regarding how your online data works in the real world.

One shitty day in I woke up to this strange email:. From onwards I always used encrypted email hosted on my own bare metal machines in overseas jurisdictions. It was annoying and required constant maintenance but it allowed me to operate for years unimpeded. PGP encryption was also fairly common especially between specific people passing me sensitive files. There were plenty of attempts. Not to mention I had to deal with regular DDoS attacks, spear-phishing attempts, constant pen-testing and other nefarious shit.

But as these things often happen I made one mistake on a lazy hungover Sunday during a beach vacation that got me rekt. DISH Network had noticed I had sold a banner to a person they were litigating against — the one time I used a stupid gmail account.

So, I had to immediately hire an attorney or else Google would forward all of my info in 14 days. Even before I got an attorney I decided I would try to quash the subpoena on these grounds alone. Surprisingly, it worked! I remember hosting a huge party all that weekend in Bangkok to celebrate.

Google was nice enough to let me know there was a subpoena for my account data but guess what? Nobody else even bothered to tell me. And by nobody else I mean: Paypal, eBay, 3 domain registrars, merch makers, VPN providers, and every other online service I had used with that email in the last five years.

They had all been subpoenaed and happily handed it over without even letting me know and it works that way even to this day. DISH Network had sent all of this data over to my lawyer to show they meant business.

The amount of data, and the sheer detail of the metadata was incredible. Every IP, plaintext passwords, every transaction, times, dates, they had everything. But worse they had my identity , the prize, to me the only thing that even mattered.

So the gig was up, but I also knew the FTA scene was nearly dead anyways and wanted everything to just be over with. It was soon found that they could not be written to however and so it was necessary to try again. About a week later North Sat was successful and he began to unloop cards and send them on to the programmer. The sheer number of cards proved to be the Achilles heel as only so many cards could be reprogrammed in a day.

Most people were playing again with unlooped cards 2 months after the ECM. So things slowly began to return to normal. Some new cards began to emerge. Most were constructed by non-programmers looking to make a quick buck. The DDT card had been dumped and people were selling the software to virtually anyone that wanted it.

A flurry of new products meant that prices would come down, it also meant that a lot of people were selling cards that they had no hope in supporting. There were still only a few people capable of writing a program. Most of these cards were copies of the DDT card. A new card called the DAT emerged among the copies. The DAT had similar appearance to the others, it also had a packet generator and a blocker built in.

The ECM happened on January The target was old 3m cards that were still being sold for low prices, and all the wedge cards.

DTV had begun a major code write to their cards in the hopes of closing the security hole which allowed the wedge type cards to operate. A few cards were spared. Although not immune to the update procedure, they were put on to life support due to the blocker that was built into some cards, like the DAT. The blocker would block the updates and allow the card to continue to operate.

Cards without initial blockers now had to add them to their cards and they needed a new virgin access card in order to make them work. These programs would activate the tiers on a new virgin access card and allow normal programming minus the PPV to be viewed in the open.

These cards were limited to 25 PPV. A non virgin card could not be programmed with this software. Directv had previously been sending regular access card updates through the 42nd packet. Wedge cards were effectively blocking these updates. Cards that did not block it were down as it patched the holes which the cards were using to turn on the channels.

Directv now began sending 5 new updates through the 40th packet, one that blockers were not designed to block. In some wedge cards, these 5 new updates would turn off the dynamic tiers PPV and the regular channel tiers would continue to run as long as the first 18 updates were being blocked. On some other cards, all channels were down.

Directv would now be in a position to 99 any cards that were not updated if they chose to. Some of the newer programs were not affected, such as the Blazer, 4M and some newer versions of the West 3M and SuperV.

Shortly thereafter the West developed the Wildthing! This unlooper was designed and engineered by a fellow out of Bulgaria.

There has never been a finer unlooper to date than the Wildthing! Now, the Wildthing! The unloopers have gone from Wildthing! October 6, there was an ECM directed at one of the more popular freeware programs available. Known now as the Oct. This ECM damaged the jump table and fuse bytes within the card. Many people underestimated DTV and shrugged it off that a fix would be available asap.

Throughout Oct. His repair involved the cloning of all cards with a good image. His success rate was rather shady and slow. The unit did the job but not exactly efficiently.

End of December the Wildthing! Finally a unit for the masses. And if you intend on subscribing to an H card you better check again as DTV will tell you to courier your H card to them and they will courier you out an HU or P3 card. Unfortunately, the only way you are running wide open viewing right now is if you apply the CAM ID of an actively running subscribed card and then 3M it.

These freeware spoofer files are not lasting long so the best is to get yourself and active sub image and 3M with your flavor of the month 3M. The P2 is so wide spread that literally everywhere on the net or next door, someone is hacking it. Freeware is running wild with the P2. Leading up to the fateful day, DirecTV had been regularly updating their cards, which had the entire hacking community confused as to why and why so regularly.

Like the final piece of a puzzle, the final updates made all the useless bits of computer code join into a dynamic program, existing on the card itself.

This dynamic program changed the entire way the older technology worked. In a masterful, planned, and orchestrated manner, DirecTV had updated the old and ailing technology. The hacking community responded, but cautiously, understanding that this new ability for DirecTV to apply more advanced logic in the receiver was a dangerous new weapon.

It was still possible to bypass the protections and receive the programming, but DirecTV had not pulled the trigger of this new weapon until…. January 21, the H card users got the shock of a lifetime. Just when DirecTV thought they had successfully accomplished their mission of eliminating the hacking community a solution was found.

Now the hacking community was back on track for only suffering a bit of a delay. The most important factor is that people should realize that the P3 will NOT be hacked via some basement hacker and then offered for free on the net. If you believe that it will happen outside a lab then you best be reading this story again.

Nope, we expect the P3 hack to come from a commercial source who can afford to pay the engineers required to dump the processor. Once commercial 3M is being loaded for a few months then maybe, only maybe, the lesser expensive alternatives will arrive. Of course they will time has shown us this game before. Early in November of there was much ado about an apparent hack for the P3 or HU card.

People claiming it was a sting or a fraud were everywhere. The original dump of this card was performed in a Russian laboratory funded by a fellow known for arranging the sale of the Magic ECM glitch points to Triton. Don represents Brian, the brains behind the coding. This file was built off original code from Triton, which exchanged hands in the sale of the Magic glitches.

Thus the likeness in appearance. In a very short time trouble began to stir within the group and rumors of inside corruption began. Behind the scenes what originally occurred was this…. Brian and Don decided to sell the technology. Now between them they decided that Triton would never have this technology nor would they sell it to them for reasons still yet unknown. So they sold their wares to a fellow nicknamed JT who at the time owned a website.

JT reportedly purchased the product for a large sum of cash and returned to the states to begin marketing his new product. Within a week of JT marketing his product Triton began marketing the same product for a considerable less amount of money. For weeks many people doubted Triton had anything to sell meanwhile collecting pre orders for sales of the item. The original loader device was shipped by Triton to the UK and completely reverse engineered and dumped by Cambridge engineers. By the end of February Triton released the Wildthing!

Piggyback chip for current loaders. Within three weeks after the release of the piggyback chip purchasers found themselves with another bonus, the Wildthing! This infuriated many as they had just paid thousands for their devices and suddenly someone releases it for free on the Internet. They successfully shut down operations of many US based web sites and prosecuted many individuals involved in the hacking or assistance in hacking of their property.

War was staged. By March , many dealers were beginning to advertise HU3M options to their clients for sale. With the public release occurring so quickly on the loader people began questioning where they would get 3M support from.



0コメント

  • 1000 / 1000