So, what is it?

The Black Chip Media Player is the elite in it’s class. Everything for streaming and features you will only find with Black Chip Technology. Streaming is Believing it’s what’s inside.Introducing the newest technology with 2.4 and dual channel 5G Wi-Fi eliminate annoying buffering. 3-D and 4K ready along with true 1080p resolution Don’t suffer through single double and quad core streaming enjoy double the streaming speed with Octa Core GPU and Bluetooth technology.

The Black Chip Media Player (BCMP527) is an all-in-one home theater IPTV entertainment system unlike any other, it is the most unique and user friendly product of its kind. It’s many capabilities include the ability to stream (on demand) almost every movie ever made, all of your favorite TV shows (past or present), live and on demand sporting events, music stations and even play video games.

MAC Address length is 12 characters, as shown above: MAC: 00: xx: 6D: 11: 3D: 5F (enter without the colons in between).


The 527 to Black Chip Media Box connects directly to your television set with the supplied HDMI cable or optional AV/RCA cable connection.
The first time you run your Media Player you will be asked whether you want to connect via WiFi or ether net. If you have a wireless router in your home and plan to connect using WiFi, you simply select your network and input your password. If you plan to connect directly to your modem, you would select ether net and attach an ether net cable to the box and modem.
Most basic internet packages will suffice, but the faster your internet, the better. We recommend you have a minimum download speed of 10mbs (10,000kbs). Test here: . For best results, we recommend a direct ether net connection.
If you plan to connect via WiFi, we recommend you check the speed where you system is going to be located.
The average 2 hour movie is about 800mbs.
This would mean that if you watched one movie a day you would need about 24gbs usage/month.
10mbs (10,000kbs). Test here: Change to 15 MPS (15000kbs)
Absolutely!!! The Black Chip Media Player is 100% Legal. The 527 uses third party programs written externally by programmers and developers via OTT content and IPTV services. These programs basically create a bridge between licensed online entertainment streams created by 3rd party developers, and the custom software installed to the Media Player. You are not hosting, downloading or uploading any content.
FCC and U.S. Supreme Court rulings addressing the classification of certain cable services have already concluded that high-speed Internet access by cable is not “cable services,” even though they are provided over the same cable system as video signals. These decisions are highly instructive on the answer to the question of whether IPTV should be regulated as cable service.
In March, 2002, the FCC issued its Cable Modem Declaratory Ruling8 concerning the appropriate regulatory treatment for broadband access to the Internet over cable facilities. In this decision, the FCC declared that cable modem service in which cable providers offer broadband or Internet access, is an interstate information service, not a cable service, and that there is no separate offering of telecommunications service when the cable operator offers cable modem service.
The FCC’s Cable Modem Order resulted in cable modem service not being subject to regulation under the Cable Policy Act. In Nat’l Cable Television Ass’n v. Brand X Internet Service (“Brand X”), the U.S. Supreme Court upheld the FCC’s Cable Modem Order.9
In Brand X, the Supreme Court held that the FCC had lawfully concluded that cable companies selling broadband Internet services do not provide telecommunications service as that term is defined under the Communications Act, and that such services are exempt from mandatory, common carrier regulation under Title II of the Communications Act.

A Florida judge has ruled that a copyright holder may not sue a person because their computer was used to illegally download content. It’s the latest in a series of decisions making it more difficult for so-called copyright trolls to sue alleged pirates.

When a copyright holder – whether it be Warner Bros., Interscope records, or another media company – tries to file suit against internet users who downloaded their content without paying, they generally identify that user with their computer’s IP address. That method of using an IP as the computer’s fingerprint has been a reliable legal method since piracy became commonplace over 10 years ago.

Yet judges have become more familiar with the intricacies of piracy as time has gone on, with a number of recent rulings deciding that an IP address alone is not enough to determine whether someone downloaded something illegally. Florida District Court Judge Ursula Ungaro has become the latest to fall on that side of the issue.

Plaintiff has shown that the geolocation software can provide a location for an infringing IP address; however, Plaintiff has not shown how this geolocation software can establish the identity of the Defendant,” she wrote. “There is nothing that links the IP address location to the identity of the person actually downloading and viewing Plaintiff’s videos, and establishing whether that person lives in this district.”

Thus Judge Urgano dismissed the case, marking what could be an important landmark for wrongly accused pirates who could find themselves on the hook for fines in the tens of thousands of dollars.

“Even if this IP address is located within a residence, the geolocation software cannot identify who has access to that residence’s computer and who would actually be using it to infringe Plaintiff’s copyright,” she wrote, as quoted by TorrentFreak.

The ruling does not apply to all future cases, although it is the latest in a trend that no longer favors copyright holders. Late last year, Judge Stephanie Rose ruled that a copyright holder may not sue hundreds of suspected pirates in Iowa based only on their IP addresses. Plaintiffs have created such scenarios by asserting that if one person downloads a torrent link, they do so by linking to other users, thereby creating a conspiracy.