> In any case, the security hole with the 'C84 is strongly > related to its use of EEPROM code memory. So as a *general* > statement the EPROM PIC's don't suffer this problem. Can anybody outline exactly how this security hole works? I've had a couple of FTP and Web sites suggested and one seems to have a program that will break the security on a PIC chip, but it has no source code, so I have no idea what it's doing. I assume that anybody who wishes to compromise the security on a PIC chip for nefarious purposes already knows how to do it, so no cats will be let out of the bag by divulging the general method here.