Try DBan for wiping disks. aka Darik's_Boot_and_Nuke . It's one of the common ways of doing it.
Might also be worth checking the disk's SMART information for health.
If you just want to decrypt on linux using stripts you could use my python script https://hummy.tv/forum/threads/offline-decryption-utility.8676/post-148858
Or is there a specific feature of stripts you need in addition?
Just suggesting a first approach if that hasn't already been tried, I expect it has. I don't have that model of humax which might make it quite hard to do.
If there are example encrypted and decrypted versions of the same file available it should be possible to see if they have used the same approach at least. i.e. only encrypt part of each packet.
I can't comment on whether it will work for HDR vs an HDR T2 but my key looks like this "000378b9a70836333731303433313931" with the mac address being
00:03:78:b9:a7:08 and the Serial Number: 63 7104319 11498
If you have custom firmware the correct key is at the bottom of the diagnostics web...
No it hasn't. But look here for my little python script that does a simple decrpytion https://hummy.tv/forum/threads/offline-decryption-utility.8676/page-18#post-148858
If they are encrypted this post https://hummy.tv/forum/threads/offline-decryption-utility.8676/page-18#post-148858 might help. If you know a bit about python.
This is a python3 script to decrypt .ts files. Works on linux, may work on other OSs, minimal testing done. Put YOUR key in the key string instead of 0000... obviously.
Decoded a 4GB .ts file in 3 minutes on my laptop. Thought someone might find it useful...
from Crypto.Cipher import DES3...
Thanks for the link. I reverse engineered it into a python script that chops the front and back off the recording to keep avidemux happy plus gives a list of where the ads are. Not quite accurate enough to trust it to remove the ads itself unfortuntely. It's as good as I'm going to get though.
I thought that would work, I just need to figure out how to con avidemux into believing it's all 5.1 even though it starts with stereo ads. Don't want to chop the front off to do it.
Not sure if it is sniffing the PMT for the stream information which would be easy to tweak or the actual stream...
Looks like that is the issue. Happens whenever there is a switch to/from adverts. I'll have to stick with reencoding the audio to be all stereo before editting out the adverts.
Each stream is separate in a single .ts file. You can filter by the PID which isn't encrypted.
E.g for the film I have trouble with
Stream type 1b ITU-T Rec. H.264 and ISO/IEC 14496-10 (lower bit-rate video) id=12d len=6
Stream type 11 ISO/IEC 14496-3 (MPEG-4 LOAS multi-format framed audio)...
I've been playing with decypting .ts files from my HDR T2 on Linux.
Thanks to all the information posted here and some ETSI specs that works nicely.
Wrote my own equivalent of stripts in C so I can make it do just what I want on the
latest Ubuntu linux. Added some options to only extract...
Try DBan for wiping disks. aka Darik's_Boot_and_Nuke . It's one of the common ways of doing it.
Might also be worth checking the disk's SMART information for health.
If you just want to decrypt on linux using stripts you could use my python script https://hummy.tv/forum/threads/offline-decryption-utility.8676/post-148858
Or is there a specific feature of stripts you need in addition?
Just suggesting a first approach if that hasn't already been tried, I expect it has. I don't have that model of humax which might make it quite hard to do.
If there are example encrypted and decrypted versions of the same file available it should be possible to see if they have used the same approach at least. i.e. only encrypt part of each packet.
I can't comment on whether it will work for HDR vs an HDR T2 but my key looks like this "000378b9a70836333731303433313931" with the mac address being
00:03:78:b9:a7:08 and the Serial Number: 63 7104319 11498
If you have custom firmware the correct key is at the bottom of the diagnostics web...
No it hasn't. But look here for my little python script that does a simple decrpytion https://hummy.tv/forum/threads/offline-decryption-utility.8676/page-18#post-148858
If they are encrypted this post https://hummy.tv/forum/threads/offline-decryption-utility.8676/page-18#post-148858 might help. If you know a bit about python.
This is a python3 script to decrypt .ts files. Works on linux, may work on other OSs, minimal testing done. Put YOUR key in the key string instead of 0000... obviously.
Decoded a 4GB .ts file in 3 minutes on my laptop. Thought someone might find it useful...
from Crypto.Cipher import DES3...
Thanks for the link. I reverse engineered it into a python script that chops the front and back off the recording to keep avidemux happy plus gives a list of where the ads are. Not quite accurate enough to trust it to remove the ads itself unfortuntely. It's as good as I'm going to get though.
I thought that would work, I just need to figure out how to con avidemux into believing it's all 5.1 even though it starts with stereo ads. Don't want to chop the front off to do it.
Not sure if it is sniffing the PMT for the stream information which would be easy to tweak or the actual stream...
Looks like that is the issue. Happens whenever there is a switch to/from adverts. I'll have to stick with reencoding the audio to be all stereo before editting out the adverts.
Each stream is separate in a single .ts file. You can filter by the PID which isn't encrypted.
E.g for the film I have trouble with
Stream type 1b ITU-T Rec. H.264 and ISO/IEC 14496-10 (lower bit-rate video) id=12d len=6
Stream type 11 ISO/IEC 14496-3 (MPEG-4 LOAS multi-format framed audio)...
I've been playing with decypting .ts files from my HDR T2 on Linux.
Thanks to all the information posted here and some ETSI specs that works nicely.
Wrote my own equivalent of stripts in C so I can make it do just what I want on the
latest Ubuntu linux. Added some options to only extract...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.