Log in
Register
Menu
Log in
Register
Home
What's new
Latest activity
Authors
Forums
New posts
Search forums
What's new
New posts
Latest activity
Members
Current visitors
New posts
Search forums
Menu
Log in
Register
Install the app
Install
Forums
Satellite Tv Encryption Decryption
Encryption Systems
Conax, Cryptoworks, Nagravision, NDS and Others
Anti C/S - Sky UK
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="juanramirezone" data-source="post: 703112" data-attributes="member: 354644"><p>Bingo, you got it.... That is very old here but effective. here is about a big one here, this happen 5 months ago ( how it kill many "cards")</p><p>Some explanation by xxxx</p><p>The CAM ID (Conditional Access Module ID) is a unique serial number attached to a legitimately subscribe card that essentially acts as the "key" to authorize viewing (by responding correctly to all the code </p><p></p><p>It should be no big surprise to assume that agents of the big providers are using IKS boxes themselves in order to learn to "counter-reverse-engineer" the piraxxx. Most of you would already know that IKS means Internet Key Sharing; that legitimately subscribed cards are used to send out the code or series of CWs (CodeWords) to allow decryption of signals - transmitted through a server - enabling TV viewing. The CAM ID (Conditional Access Module ID) is a unique serial number attached to a legitimately subscribe card that essentially acts as the "key" to authorize viewing (by responding correctly to all the code protocols).</p><p></p><p>The providers successfully tracked down these subbed cards used by the IKS and XXX systems through a simple process and shut them down (disabled the CAMids). Those postulating about the process believed that the providers used a trojan (a virus) to trick the "offending cards" to be identified when sending out the CW. Whatever the "counter-reverse-engineering" process is is really immaterial for poor laymen like us.</p><p></p><p>What is important is to try to figure out what is keeping the big IKS boys "dark" and how long this situation will persist. Some say it is the end! Repent! Other say the smart ones (like xx) are trying to "clean their system of the virus" and "reverse engineer" the loophole that caused the IKS system to get compromised.</p><p></p><p>In this era of "reverse engineering" and "counter-counter-espionage", it remains a "cat and mouse game". One thing is certain, neither parties in this battle are patting themselves on the back with their accomplishment - not the PROVIDERS and not the REVERSE ENGINEERS. It is no longer simply "preventing signal piracy" that matters. It is a BATTLE OF WITS: one party saying, "I got you this time", while the other party says, "That's what you think!" </p><p>The solution is not merely to install security measures to block CAMid compromises. Their biggest challenge is develop some sort of a firewall to block data traffic to and from the server - much like using an encryption code between receiver and server. </p><p>"They were down for 1 months" Last one was about use the EPG for causing the CCE (Channel Change Error) disable the chanel change on the receiver, just one channel, last about 2 weeks, I hope somebody here post about the kind of ECM in this zone,</p></blockquote><p></p>
[QUOTE="juanramirezone, post: 703112, member: 354644"] Bingo, you got it.... That is very old here but effective. here is about a big one here, this happen 5 months ago ( how it kill many "cards") Some explanation by xxxx The CAM ID (Conditional Access Module ID) is a unique serial number attached to a legitimately subscribe card that essentially acts as the "key" to authorize viewing (by responding correctly to all the code It should be no big surprise to assume that agents of the big providers are using IKS boxes themselves in order to learn to "counter-reverse-engineer" the piraxxx. Most of you would already know that IKS means Internet Key Sharing; that legitimately subscribed cards are used to send out the code or series of CWs (CodeWords) to allow decryption of signals - transmitted through a server - enabling TV viewing. The CAM ID (Conditional Access Module ID) is a unique serial number attached to a legitimately subscribe card that essentially acts as the "key" to authorize viewing (by responding correctly to all the code protocols). The providers successfully tracked down these subbed cards used by the IKS and XXX systems through a simple process and shut them down (disabled the CAMids). Those postulating about the process believed that the providers used a trojan (a virus) to trick the "offending cards" to be identified when sending out the CW. Whatever the "counter-reverse-engineering" process is is really immaterial for poor laymen like us. What is important is to try to figure out what is keeping the big IKS boys "dark" and how long this situation will persist. Some say it is the end! Repent! Other say the smart ones (like xx) are trying to "clean their system of the virus" and "reverse engineer" the loophole that caused the IKS system to get compromised. In this era of "reverse engineering" and "counter-counter-espionage", it remains a "cat and mouse game". One thing is certain, neither parties in this battle are patting themselves on the back with their accomplishment - not the PROVIDERS and not the REVERSE ENGINEERS. It is no longer simply "preventing signal piracy" that matters. It is a BATTLE OF WITS: one party saying, "I got you this time", while the other party says, "That's what you think!" The solution is not merely to install security measures to block CAMid compromises. Their biggest challenge is develop some sort of a firewall to block data traffic to and from the server - much like using an encryption code between receiver and server. "They were down for 1 months" Last one was about use the EPG for causing the CCE (Channel Change Error) disable the chanel change on the receiver, just one channel, last about 2 weeks, I hope somebody here post about the kind of ECM in this zone, [/QUOTE]
Insert quotes…
Verification
Post reply
Forums
Satellite Tv Encryption Decryption
Encryption Systems
Conax, Cryptoworks, Nagravision, NDS and Others
Anti C/S - Sky UK
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top