It's my understanding that Baseline Privacy is fairly weak encryption, using 56bit DES. DES is amazingly weak, and we (Team AnandTech Distributed Computing) were breaking DES in under a day with hardware that probably costs less than $10k these days. So while it's not trivial to crack DES, it's easy enough that anyone that wants to take the time and has the skills, can do so for fairly cheap. It's secure enough to keep out the casual hackers looking to break in, but it won't stop anyone who is committed.Originally posted by: ScottMac
Each user is in essentially a VPN between the home and the aggregate point within the (secure) provider's network.
Further, the Ethernet traffic is encoded in one of a number of ways (depending on the system) such that you would need a protocol analyzer specific to that encoding, in order to capture the (encrypted) traffic to try and break/decrypt it.
It's not impossible , but it's not likely (to an extreme degree). Do keep in mind that the government has the keys to all of the "legal" encryption and can look at anything it can justify (probably cause, reasonable suspicion).
Originally posted by: Modelworks
You can intercept someone else cable connection by using cloning. Its a matter of fooling the provisioning server into thinking you have the same modem as the one that you want the data from.
It is not common because most cable operators have put in safeguards to prevent it. Like only allowing the modem to be provisioned once. The problem before was that even if they did put in that safeguard they sometimes did not link the provisioning servers or they were updating slowly allowing two modems to get the same provisioning information.
Just google modem cloning and you can find all the information you need.
Most of it is irrelevant now but its still a good read.
Once you have the same provisioning its easy to get the other persons data.
Originally posted by: VirtualLarry
I assume that you have to be on the same physical node as the one that you want to sniff too, right?
