Many supossed-good-working SUPCAM sellers also! be aware!
Posts by dabezt
-
-
cifrado en el firmware de los receptores. Abrir un emulador como OSCam y extraer datos es muy sencillo, ya que es un sistema gratuito de "código abierto". Para abrir un firmware de un sistema IKS es necesario obtener las claves de protección del archivo, y eso es muy, muy difícil que suceda. El seguimiento de una tarjeta en un sistema de viviendas compartidas es un juego de niños para cualquier profesional. Además, los sistemas iks utilizan sus propios emuladores, desconocidos hasta ahora. Es cierto que un sistema iks puede ser inestable en determinados momentos, por la cantidad de receptores que debe alimentar y sobre todo por la ubicación del servidor y bajo qué soporte trabaja, dependiendo del país de ubicación Un servidor alojado en España que mantiene una red de fibra muy segura y estable no es lo mismo que un país de Latam cuya calidad de conexión se vuelve más inestable.
No dudo que es muy dificil 'atacar' a iks.... pero esta pasando: iks pt esta sufriendo fallas... segun la mayoria de los foros de iks
¡Salud!
PT quiebra por ruptura de Movistar en líneas de Negocio. El Sistema de Fibra Óptica y la línea telefónica de la red de la empresa hoy ha estado caída.
Un fallo generalizado en la red de Movistar, ya solucionado, impidió a los clientes corporativos realizar o recibir llamadas desde las 11.00 a las 13.30 horas
I'm aware of it... clientes corporativos (enterprise customers, big ones... not retail customers) and it was during the morning... at the evening iks continues failling ;-)
-
if through injecting QoS packets they tried to delay the sending of the ECM, the emulator would mark a "timeout" since the time expired and it did not find the response in time. From what we have studied, the problem comes from 2 fronts. 1- R100 versions distributing fakes through their cache. (Attack interested by the creators of multiCS R100 to sell its paid version) 2- Cards in penalty mode. (Movistar attack to penalize sharing) L
My bet is on Movistar is putting cards in a kind of 'penalty mode'... they have to know how many 'request' are done by each card x channel pID ... lot of big servers have been very greed! ;-)
But I do not discard some hosts / addresses 'direct' DDOS 'attacks' to big servers.... today .xyz seems to run without issues ¿weird? -
encryption in the firmware of the receivers. Opening an emulator like OSCam and extracting data is very simple, since it is a free "open source" system. To open a firmware of an IKS system it is necessary to obtain the protection keys of the file, and that is very, very difficult to happen. Tracking a card in a home sharing system is child's play for any professional. In addition, iks systems use their own emulators, unknown until now. It is true that an iks system can be unstable at certain times, due to the number of receivers it must feed and especially due to the location of the server and under which support it works, depending on the country of location A server hosted in Spain that maintains a very secure and stable fiber network is not the same as a country in Latam whose connection quality becomes more unstable.
I do not doubt about it's very dificult to 'attack' iks.... but it's happening: iks pt is suffering kind of fails... according to most of the iks forums
CheerS!
-
Iks are aslo falling right now :-(