Chuck, You wrote: >An alternate solution would be to have two CP bits configured in an 'OR' >configuration (there are several easy geometries to support this). One of >them is a floating transistor gate (ie UV programmable), one of them is >a silicon fuse (ie programmable but not reversable). If you program with >CP1 set you get a part that acts just like the production part but can be >erased (including the CP bit), if you program with CP2 set then the part >becomes permanently copy protected. (Note that if you also disable >programming with this fuse you prevent the 'programming' attack as well.) >[NB: If you don't know what the programming attack is, don't bother asking >since I won't tell you.] How about another bit to completely disable the _initial_ function of the protection bits. That way the factory could fix the JW parts so that they would not code protect. After all, they have to program the PIC14000 calibration factors into every chip anyway. Will the programming attack work on the PIC14000? I thought that that would only work with EEPROM devices. (I am just interested in fixing my problem. I would never try to steal code from anyone else. The guys that do should take a course in Ethics. I know the time/value of programming.) Joe