These services use the Stalker protocol, which authenticates users based on their device's unique MAC address .

Illegal IPTV Streaming Services - How To Know the Difference

Lists of "free" codes found online are usually subscriptions that have been "leaked" or cracked. Because these services often limit a subscription to one simultaneous connection , these codes frequently fail (buffer or disconnect) when multiple people try to use them at once. Review of Using Publicly Shared Codes