Satellite TV Hacker Tells His Story 160
Wired is running a story about Christopher Tarnovsky, the man who was accused of working for NDS, a company owned by Rupert Murdoch's News Corp., to sabotage a competitor's satellite TV system. Wired had a chance to speak with Tarnovsky and get his description of how the smart-card hacking war developed. Quoting:
"Tarnovsky, who was known online as 'Big Gun,' says Ereiser offered him $20,000 to fix cards that were killed by ECMs, and he agreed. Each time NDS created a countermeasure, Tarnovsky would analyze the code and find a way to circumvent the countermeasure. He did it while working full-time as a software engineer for a semiconductor company in Massachusetts. 'I'd be at work and I'd check the IRC (channel) to see if they'd launched their Thursday countermeasure yet,' he says. 'It was like a chess game for me. I couldn't wait for them to do a countermeasure because I would counter it in minutes.' It wasn't long before NDS came courting. Tarnovsky had a contact at the company to whom he'd begun passing information about holes in its software, even supplying patches to fix them."
OLD (Score:1, Informative)
Impressive (Score:2, Informative)
That aint nothing. (Score:5, Informative)
The Video Shows the Holy Grail of Sat Hacking (Score:5, Informative)
Re:The Video Shows the Holy Grail of Sat Hacking (Score:3, Informative)
Kind of "google earth" in reverse was its software interface for looking at stuff. Slicker than snot.
Re:The Video Shows the Holy Grail of Sat Hacking (Score:1, Informative)
Those are techniques used in failure analysis (Score:5, Informative)
I knew a guy who worked at a chip manufacturer and that's what he did. Failure analysis.
Burn the top of the chip off with what he called "formic acid" (I think, this was over 20 years ago) which "didn't hurt the chip".
They would then look at it under a microscope and try to determine what had failed.
The second microscope Tarnovsky was using looked to be a wire bonder.
It welds wires on by hand, with a pantograph type positioner.
So you can connect the chip to the leads, for example in the package, common for eproms. You can see the little leads in the window of older eproms.
But hackers can also use those to reconnect the last link of a programmable chip like a PAL that has had the security fuses blown after programming. Then you can just read the program out of the chip. OOPS, there goes that programmable security.
I had a chance to get one of those once, but it was a big one. Too big for me.
The little tabletop one in the video would be neat. I would grab one of those if it ever presented itself.
Tarnovski used that wire bonder to grab the signals off the chip internally, where they are actually running.
Those smartcards are likely a serial device, but if you can get back to where the data bus is parallel maybe that is before the inherent security.
The guy is obviously good. Wonder if he has a college degree?
Tarnovsky == Flylogic (Score:5, Informative)