Sorry, I meant the .ts was encrypted, not the .zip
That command generates a file name of "-" inside the .zip, which is slightly annoying on extraction.
	
	
		
		
			Should I have decrypted the recording (all 0s key) first?
		
		
	 
I thought that would be obvious for a man of your calibre! How do I read it unless it is decrypted, unless I know the key (which I now do)?
Anyway, it confirms the list of services with broken tables as:
4287, 4672, 4736, 5696, 8500, 8600, 8601, 13024, 13144, 15920, 16016, 16170, 16188, 16194,
16280, 16322, 16394, 22400, 24448, 27232, 27744, 27776, 27904, 28032, 33856, 34240, 34496
which is broadly similar to mine (I found it varies with time).