Bingo, you got it.... That is very old here but effective. here is about a big one here, this happen 5 months ago ( how it kill many "cards")
Some explanation by xxxx
The CAM ID (Conditional Access Module ID) is a unique serial number attached to a legitimately subscribe card that essentially acts as the "key" to authorize viewing (by responding correctly to all the code
It should be no big surprise to assume that agents of the big providers are using IKS boxes themselves in order to learn to "counter-reverse-engineer" the piraxxx. Most of you would already know that IKS means Internet Key Sharing; that legitimately subscribed cards are used to send out the code or series of CWs (CodeWords) to allow decryption of signals - transmitted through a server - enabling TV viewing. The CAM ID (Conditional Access Module ID) is a unique serial number attached to a legitimately subscribe card that essentially acts as the "key" to authorize viewing (by responding correctly to all the code protocols).
The providers successfully tracked down these subbed cards used by the IKS and XXX systems through a simple process and shut them down (disabled the CAMids). Those postulating about the process believed that the providers used a trojan (a virus) to trick the "offending cards" to be identified when sending out the CW. Whatever the "counter-reverse-engineering" process is is really immaterial for poor laymen like us.
What is important is to try to figure out what is keeping the big IKS boys "dark" and how long this situation will persist. Some say it is the end! Repent! Other say the smart ones (like xx) are trying to "clean their system of the virus" and "reverse engineer" the loophole that caused the IKS system to get compromised.
In this era of "reverse engineering" and "counter-counter-espionage", it remains a "cat and mouse game". One thing is certain, neither parties in this battle are patting themselves on the back with their accomplishment - not the PROVIDERS and not the REVERSE ENGINEERS. It is no longer simply "preventing signal piracy" that matters. It is a BATTLE OF WITS: one party saying, "I got you this time", while the other party says, "That's what you think!"
The solution is not merely to install security measures to block CAMid compromises. Their biggest challenge is develop some sort of a firewall to block data traffic to and from the server - much like using an encryption code between receiver and server.
"They were down for 1 months" Last one was about use the EPG for causing the CCE (Channel Change Error) disable the chanel change on the receiver, just one channel, last about 2 weeks, I hope somebody here post about the kind of ECM in this zone,