home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.sys.amiga.programmer:17819 comp.sys.amiga.hardware:22083
- Path: sparky!uunet!cs.utexas.edu!torn!news.ccs.queensu.ca!qucdn!leek
- Organization: Queen's University at Kingston
- Date: Sat, 26 Dec 1992 13:59:03 EST
- From: <LEEK@QUCDN.QueensU.CA>
- Message-ID: <92361.135903LEEK@QUCDN.QueensU.CA>
- Newsgroups: comp.sys.amiga.programmer,comp.sys.amiga.hardware
- Subject: Re: Attn Commodore: You are making a Big Mistake (Hardware
- References: <38039@cbmvax.commodore.com> <38m5VB4w165w@lakes.trenton.sc.us>
- <38111@cbmvax.commodore.com> <BzqqyC.M1o@gpu.utcs.utoronto.ca>
- <38130@cbmvax.commodore.com> <92359.214301LEEK@QUCDN.QueensU.CA>
- <1992Dec25.154400.4669@mpifr-bonn.mpg.de>
- Lines: 28
-
- In article <1992Dec25.154400.4669@mpifr-bonn.mpg.de>,
- mlelstv@specklec.mpifr-bonn.mpg.de (Michael van Elst) says:
- >
- >In <92359.214301LEEK@QUCDN.QueensU.CA> <LEEK@QUCDN.QueensU.CA> writes:
- >>Now all the hacker has to do is to download the JEDEC fuse map to
- >>'emulate' the ID that the software was written for.
- >
- >Provided that someone knows the ID. While it isn't impossible to
-
- If the Amiga hardware HAD included the ID PAL, there would be OS
- support routines that reads it... (I am not talking about 3rd party
- added doungles here which is another can of worms.) It doesn't
- take a lot to reconstruct the truth tables that allows one to compile
- it back to JEDEC.
-
- >crack a read-protected PAL one could use a more complex FPGA
- >which can't be cracked in a reasonable time (that's what many
- >dongles use).
-
- True. That doesn't mean priates can disassemble the program to remove
- the protection. All you need is one single priate to break the code
- and the rest of the world would have it. (As for the software side of
- things, it belongs to either .programmer or .misc discussion.)
-
- >Michael van Elst
-
- K. C. Lee
- Elec. Eng. Grad. Student
-