Ok then someone with an orby ird should post the system info screen that shows the rev of the cam only. There are actually some capable of decoding g3 stream logs despite the people who say otherwise.
Not sure what you mean with decoding,but I guess is decrypting the packets.And you imply they are emulating.
The only way nagra 2 was decoded was with a complete full dump of the card,including sysrom,a work that was possible because the initial reading was possible and tons of work by highly specialized individuals (this people is gone now),with nagra 3 (or upgraded 2) nobody was able to read anymore,so your chances are zero for this service.
My guess is you have never seen any EMM or ECM decrypted packet,and believe because someone says it.If that so,no point to explain more to you.
My point is there are believers everywhere,of any kind,and only the ones that know about nagra are the ones to be considered.(they would not be asking what they already know)
Out of curiosity I want to ask you to ask your friends for a decrypted EMM (global or Unique) or ECM as to make the story more believable.
Basically you would need a full dump (eeprom,rom,sysrom) of a card 1835 to be able to emulate.
As a reminder,apparently vplug has no way to distinct between nagra 2 and higher versions,it will always say nagra 2 with any CA ID 1801 and up.
But Anubis would know better.