> From dthomas@einet.com Tue Jul 12 01:16:25 1994 > Date: Mon, 11 Jul 94 17:14:27 MDT > From: dthomas@einet.com (David B. Thomas) > Message-Id: <9407112314.AA13398@einet.com> > To: pic@figment.mit.edu > Subject: protection? > > What's this I keep hearing about being able to break the protection on > a pic? This is definitely something I'll need to know about, as I > have a pic design that I will want to be able to protect in about 6 > months when we're ready to go into production. > > -DeeT > The first $40 adresses can be read even if the PIC is protected. The PIC is destroyed in the process. I've only tested this on a windowed 16C54. I've also written a program that does this automatically and generates an INTEL dump file. (This is not the program called PICBUSTER) I did this to be able to copy a cableTVdecoder, the code was more than $40 words long so I didn't try it though. No, you can't have my program and I won't tell you more than to read the datasheets on how to program the PIC's. The same decoding principal is said to work on some PAL's too... /Anders 'Hedex' Hedberg Solution: Have no secrets below adress $40.