Rumor: CCCam has a backdoor designed by the developer. The backdoor allows the reading of the card data (serial number). Access to the back door is possible even without user / pass. Just the IP or dyndns address is needed. From the backdoor, access to the peer data is also available. Rumors say that the CCCam developer has written an easy Windows software that allows to gather from the backdoor the card serials and dyndns of the peers and sell this data to NDS, Irdeto, etc… put this together with my own personal feelings that dyndns has either been hacked or struck a deal with NDS to pass on the addresses of people cardsharing and we may have an answer.After all ive yet to find anyone who was not using dyndns who has had their card turned off. This could explain how NDS has found the cards being shared on the networks and shut down the account of the client. I wouldn't say DynDNS has any involvement in this either. Stretching my imagination, it could be said that DynDNS could return a list of previous IP addresses associated with hostnames already known to be c/s, but that's about all...(should the domain no longer be resolveable) With regards to CCcam, once a hostname/ip and port are known, this exploit could return hostnames/ports/users etc of all shares (both local and remote) which (if connected to people that are using external shares) could potentially snowball into many servers being probed..(resulting in yet more shares) In quoting from another source, the point being made is not how $ky captured people with doctored ECMs, but the fact a backdoor does appear to exist in CCcam v1.6.1+... this is what i heard/read on another site. just thought i share it,
fint , i take your word for it,, your usually right, just said i post it anyway, there was a bit of talk about it..