Forgot your password?
typodupeerror
Security Government The Courts News

Murdoch's Hacker Speaks Out 86

Posted by kdawson
from the all-for-pay dept.
This article from a Swiss newspaper recounts the appearance of Christopher Tarnovsky at the European Black Hat conference (link is to a Google translation of the French original). Next month Tarnovsky will testify in a lawsuit brought by a maker of satellite TV encryption systems (Kudeslki) against an Israeli company (NDS), for whom Tarnovsky worked until recently. (NDS is owned by Rupert Murdoch's News Corp.) While with NDS, Tarnovsky cracked Kudeslki's crypto, but claims he didn't post the result on the open Net. His responses to audience questions are amusing, in particular when someone from Microsoft asks him about breaking the Xbox 360 console. Tarnovsky replies (in the translation): "I have been offered 100,000 dollars for the break, but I replied that it was not enough."
This discussion has been archived. No new comments can be posted.

Murdoch's Hacker Speaks Out

Comments Filter:
  • by mrtom852 (754157) on Monday March 31, 2008 @06:27AM (#22919392)

    European countries are very small, and Movies/Sport rights are sold by countries. That means that if you want BskyB in France, you can't except by a portage via an UK address
    Isn't this against EU law?
  • Re:Cheapskate (Score:2, Interesting)

    by Nerdfest (867930) on Monday March 31, 2008 @07:27AM (#22919614)
    I can't imagine who'd pay large amount to break the protection on a console ... a competitor, perhaps? Hasn't the 360 already been somewhat cracked anyway?
  • by NotQuiteInsane (981960) on Monday March 31, 2008 @07:35AM (#22919640) Homepage

    In his view, the lawsuit against NDS is an attempt to racketeering. "Of course I broke cards Kudelski, he begins annoyed. I was paid by NDS to do so. It's an activity that leads all companies in the sector. But why would I published these codes for free on the Net? I am not stupid, and I never had the intention to take that risk."

    Interesting.. so AIUI all the CA (conditional access) vendors routinely break each others' systems. That's not surprising in itself (I'll admit to having learned a fair bit from reverse engineering other peoples' code). It does seem a tad unethical though, especially the alleged release of the code. I wonder if the code release was a decision made by upper management at NDS / News Corp (and it wouldn't surprise me in the least if that turned out to be the case). From the outside, this looks a lot like a protection racket... "Buy our system, because it would be an awful shame if your revenue stream were to be... terminated"

  • Trial date (Score:2, Interesting)

    by Anonymous Coward on Monday March 31, 2008 @07:39AM (#22919668)
    The trial begins April 8 2008 , details on Pacer 8:2003cv00950

    Most info on this trials documents has been sealed or blacked out like a UFO conspiracy
    mostly to protect the outlandish claims of Echostar and their consultants from public
    embarassment

    Its all lies and soon the trial will reveal everything, this lawsuit loss and the 100 million or so they
    owe Tivo after losing that lawsuit will be the final nail in Echostar's coffin.

    JJ Gee enjoy your retirement.
  • by jimicus (737525) on Monday March 31, 2008 @07:45AM (#22919688)
    Isn't this against EU law?

    Very likely, but Murdoch runs a large company and like most large companies the law is what they say it is unless and until ordered otherwise by a court.
  • Re:Sky TV uses Linux (Score:3, Interesting)

    by jimicus (737525) on Monday March 31, 2008 @07:49AM (#22919706)
    Or, we have thought of it, it's just not as easy as you think. The problem is that the decoder has to have the key, otherwise the paying client can't watch TV. A pirate reverse engineers the decoder to find the key. The defence against this type of attack is to try and hide the key - one solution is to hide the key in hardware - the smartcard option. Another is to hide the code in software, using code obfuscators, virtual machines, whiteboxes. The final option is to obtain the key from a server, using two-way comms.

    Don't modern Sky digital boxes have a telephone connection?

    I reckon a nice easy partial solution would be to tie the smartcard's key with the serial number of the box in a database back at head office. Then if two boxes reported different serial numbers but the same smartcard, you disable it.

    Forces the attacker to attack the box as well as the smartcard.
  • Re:Sky TV uses Linux (Score:2, Interesting)

    by Anonymous Coward on Monday March 31, 2008 @07:51AM (#22919720)
    Cracks are dead easy, just pay 20K to have the card shaved, and a scanning microscope to read the bus signals - then a lot of time for analysis. Or if really well heeled, and ion deposition scope to repair cut debug circuitry (Cambridge University has good researchers). This is a little more than the seed capital to some. If its hardware, it is breakable, no buts. Many smart people could have done it, especially disgruntled shareholder(s) or media /program buyers, or someone making a play on shorting. No end of suspects. Releasing the hack - not likely, you can make money both ways. Big players always compartmentalize their research stages/ efforts, while the juniors are paid to leave 'turnkey' systems behind. Wild stab in the dark prosecution based on hunches, should be summarily dismissed, with very large costs to discourage pin the tail on the donkey games.
  • Re:Sky TV uses Linux (Score:5, Interesting)

    by demallien2 (991621) on Monday March 31, 2008 @09:18AM (#22920250)
    Yes, yes they have. Not by you though, apparently.

    Jiminicus, my job is to crack decoders. Well, at least half the time. The other half is spent designing systems to make the cracker's life difficult, by blocking the attacks that I have used myself.

    For example, with your scheme, I would reverse engineer the official decoder, and then patch the code that checks the return code, so that the check always returns TRUE. Now, that can be defeated by making it so that the value returned by the server is actually a key. My next attack would then be to try and convince the server that I am a real official decoder, and that it should give me the key. Unless care is taken, I could probably get the necessary information for this by launching a man-in-the-middle attack on an official decoder.

    The typical defence against this attack is to protect the link by using certificates signed by the encryption provider, and linked to the decoder's serial number. As a pirate, I then just extract the official certificate either from the decoder itself, or from the conversation of a real box. I can then clone the certificate/identity of the decoder, and the server will talk to me as though I'm a real decoder.

    The response to that attack is to verify that there are not two decoders connected at the same time that use the same identity. But this is not as simple as it sounds. For performance reasons, servers are distributed to handle different 'parks' of decoders. But I have to maintain a synchronized list of currently logged in decoder identities across all servers. This is a definately non-trivial task, or at least that's what my collegues that work on the head-end code tell me.

    Other options for a cracker include trying to find a way to compromise the head-end server, and then poke around on it to dig up signing certificates and other good stuff to circumvent the protection. Or he might launch a denial of service attack - most server solutions have a 'degraded' fall back mode where the TV signal is encrypted with a key kept locally in the decoder, to be used if the key servers fail for whatever reason. That key can of course be extracted by the traditional means.

    Believe me, many, many, many people have tried to come up with solutions to this problem. The server approach that I have just outlined is the most secure that we have found to date, but as I have also described, it has problems too. Not to mention that it is expensive/complicated to implement.

Often statistics are used as a drunken man uses lampposts -- for support rather than illumination.

Working...