Homebrew The new 10.5 update reminds me of DirectTV

HiddenRambler

Well-Known Member
OP
Member
Joined
Nov 20, 2015
Messages
148
Trophies
0
XP
651
Country
These seemingly innocuous 3DS updates that are happening recently reminds me of the stunt DirectTV pulled against TV pirates. Much like DirectTV did these updates seem to be leaving known vulnerabilities seemingly intact.

From http://hardware.slashdot.org/story/01/01/25/1343218/directvs-secret-war-on-hackers

"Allow me to give you some background.
"One of the original smart cards, entitled 'H' cards for Hughes, had design flaws which were discovered by the hacking community. These flaws enabled the extremely bright hacking community to reverse engineer their design, and to create smart card writers. The writers enabled the hackers to read and write to the smart card, and allowed them to change their subscription model to receive all the channels. Since the technology of satellite television is broadcast only, meaning you cannot send information TO the satellite, the system requires a phone line to communicate with DirecTV. The hackers could re-write their smart cards and receive all the channels, and unplug their phone lines leaving no way for DirecTV to track the abuse. DirecTV had built a mechanism into their system that allowed the updating of these smart cards through the satellite stream. Every receiver was designed to 'apply' these updates when it received them to the cards. DirecTV applied updates that looked for hacked cards, and then attempted to destroy the cards by writing updates that disabled them. The hacking community replied with yet another piece of hardware, an 'unlooper,' that repaired the damage. The hacker community then designed software that trojanized the card, and removed the capability of the receivers to update the card. DirecTV could only send updates to the cards, and then require the updates be present in order to receive video. Each month or so, DirecTV would send an update. 10 or 15 minutes later, the hacking community would update the software to work around the latest fixes. This was the status quo for almost two years. 'H' cards regularly sold on eBay for over $400.00. It was apparent that DirecTV had lost this battle, relegating DirecTV to hunting down Web sites that discussed their product and using their legal team to sue and intimidate them into submission.

"Four months ago, however, DirecTV began sending several updates at a time, breaking their pattern. While the hacking community was able to bypass these batches, they did not understand the reasoning behind them. Never before had DirecTV sent 4 and 5 updates at a time, yet alone send these batches every week. Many postulated they were simply trying to annoy the community into submission. The updates contained useless pieces of computer code that were then required to be present on the card in order to receive the transmission. The hacking community accommodated this in their software, applying these updates in their hacking software. Not until the final batch of updates were sent through the stream did the hacking community understand DirecTV. Like a final piece of a puzzle allowing the entire picture, the final updates made all the useless bits of computer code join into a dynamic program, existing on the card itself. This dynamic program changed the entire way the older technology worked. In a masterful, planned, and orchestrated manner, DirecTV had updated the old and ailing technology. The hacking community responded, but cautiously, understanding that this new ability for DirecTV to apply more advanced logic in the receiver was a dangerous new weapon. It was still possible to bypass the protections and receive the programming, but DirecTV had not pulled the trigger of this new weapon.
"Last Sunday night, at 8:30 pm est, DirecTV fired their new gun. One week before the Super Bowl, DirecTV launched a series of attacks against the hackers of their product. DirecTV sent programmatic code in the stream, using their new dynamic code ally, that hunted down hacked smart cards and destroyed them. The IRC DirecTV channels overflowed with thousands of people who had lost the ability to watch their stolen TV. The hacking community by and large lost not only their ability to watch TV, but the cards themselves were likely permanently destroyed. Some estimate that in one evening, 100,000 smart cards were destroyed, removing 98% of the hacking communities' ability to steal their signal. To add a little pizzazz to the operation, DirecTV personally "signed" the anti-hacker attack. The first 8 computer bytes of all hacked cards were rewritten to read "GAME OVER".
 

Shubshub

The Shubinator
Member
Joined
Oct 16, 2009
Messages
1,064
Trophies
1
Age
28
Location
The dark part of your house
XP
2,570
Country
New Zealand

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,074
Country
That was rather fascinating. However, with a hardmod and a 9.2 NAND backup I don't know what Nintendo could do short of building in secret code which either modified something elsewhere in hardware (i.e. if there's a secret FW elsewhere [doubtful]), or physically destroy the console if emuNAND is detected on the SD card.
 

Shubshub

The Shubinator
Member
Joined
Oct 16, 2009
Messages
1,064
Trophies
1
Age
28
Location
The dark part of your house
XP
2,570
Country
New Zealand
That was rather fascinating. However, with a hardmod and a 9.2 NAND backup I don't know what Nintendo could do short of building in secret code which either modified something elsewhere in hardware (i.e. if there's a secret FW elsewhere [doubtful]), or physically destroy the console if emuNAND is detected on the SD card.
Perhaps write a function that lets them Force Format the SD Card to a Write-Once only format then lock it? =P
 

Shubshub

The Shubinator
Member
Joined
Oct 16, 2009
Messages
1,064
Trophies
1
Age
28
Location
The dark part of your house
XP
2,570
Country
New Zealand
"CD-R" is not a filesystem, also CDs function differently to SD cards and other storage media I thought. I've never heard of a case of a hard drive/etc. being permanently locked and un-formatable
I suppose... I feel they'll go the cuntish route... Considering they already have Region Locking hell why not just make a Proprietary Nintendo Card that can detect if there is any modified code running on it And is updateable by the System Firmware
 

The Real Jdbye

*is birb*
Member
Joined
Mar 17, 2010
Messages
23,327
Trophies
4
Location
Space
XP
13,904
Country
Norway
CD-R?

Or they could develop a proprietary Nintendo Only format and be cunts about it that way and make them Able to Lock them Permanantly
That isn't a filesystem, but a physical limitation of the format. Memory cards don't work like that (and even if they did, it wouldn't stop people with CFW, they would just reformat emuNAND with another card)

Honestly, Nintendo would probably be the last people to pull a stunt like this. They aren't even actively banning pirates even though they could have done so many times over, and they've never been known for actively banning people. They could start now, but it seems unlikely.
 

mashers

Stubborn ape
Member
Joined
Jun 10, 2015
Messages
3,837
Trophies
0
Age
40
Location
Kongo Jungle
XP
5,074
Country
A format-resistant filesytem is not possible. A low level zero fill on the disk would erase the filesytem and allow reformatting. CD-Rs are write-once and non-erasable because of how they work physically (data literally being burned onto the medium so cannot be removed or changed).

--------------------- MERGED ---------------------------

"CD-R" is not a filesystem, also CDs function differently to SD cards and other storage media I thought. I've never heard of a case of a hard drive/etc. being permanently locked and un-formatable unless it's broken
Hard drives can have their firmware locked and this can be difficult to remedy. But flash media don't have fw afaik.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    The Real Jdbye @ The Real Jdbye: ballcock