User:JulianReiche/sandbox

This draft contribution is for the https://en.wikipedia.org/wiki/Nagravision page, evidently more formating work is needed (especially with finding authorative sources) amoung editorial changes.

Free To Air Receivers
Negravision 1 was compromised in 1999 and became popularly circumvented later through the use of third party software on Free To Air (FTA) receivers. FTA satellite receiver industry incumbents, Fortec and Pansat, were the first to receive third party software which included code that emulated security cards with Negravision encryption. These third party software files allowed users to insert cracked encryption keys that the emulated security card used to decode satellite streams. These third party software files were called bins for their '.bin' file format and were released by teams that were recognized by the brand of FTA manufacture for whom they released software. Many speculated that FTA manufacturers paid for teams of coders to create the cracking software to increase their receiver sales. This speculation was further fueled as the coders had access to FTA receivers source code to create the third party cracking bins. FTA manufacturers do not release their receiver’s source code to the public in an effort to curb knock off manufacturers. These software bins dramatically increased the sales of FTA receivers developing an industry of wholesale dealers and third party support sites. Negravision 2 was compromised publically with the release of bins for Coolsat FTA receivers followed by Viewsat and Sonicview. In response to the circumvention of the Negravision 2 encryption system, satellite providers began changing keys more frequently prompting coders to create software for their receivers that could 'auto roll'. 'Auto roll' was software code within the bin files that allowed receivers to roll over from the old encryption keys, which were inputted by the user, automatically to the new ones pushed out by the service providers. Through this 'auto roll' method receivers were able to reliably decode signals for periods spanning one to three months at a time. In an effort to combat piracy, service providers would less frequently send out entitlement management message (EMM) which would force coders to release new bins that would properly emulate the updated functions of security cards. The speed at which coders could respond to providers’ attempts to stop piracy and the duration of hacks running of FTA receivers became the referencing standard when purchasing an FT receiver for nefarious intent. These receivers continued to receive updates compromising the Negravision 2 encryption system until its’ successor Negravision 3 launched worldwide.

Negravision 3
Negravision 3 has yet to be publically compromised as the encryption system is significantly more secure than Negravision 2 and there does not appear to be the same financial incentive present that was offered by receiver manufactures weary of lawsuits.

Instead of focussing resources toward creating a standalone crack for Negravision 3 which works on FTA receivers or on modified smart cards, hackers have favoured Internet Key Sharing (IKS). IKS systems provide an easier avenue to gain profit while avoiding the legal pressure associated with the Negravision cracking encryption standard which is used across the world.