Hi all, I am using a 12f629 with code protection. I have read and seen places that advertise reverse engineering or "recovery" of secured devices. I imagine this would be somewhat easy with a ROM mask type device, if you could pull the top off, a good enough microscope could see the ROM. Is there a way to "read" flash based devices in a similar manner? How practical would it be for them to connect probes and/or bypass the protection curcuitry or maybe just unset the CP bit? Is an OTP any different than a flash in this reguard? I have even heard (on piclist archives) of special (read: expensive) programmers that violate the chips in such a way that it could read the code. I don't want to do this, I just want to know if anyone knows if it is possible and how easy or common a practice it is. Thanks, Ben -- http://www.piclist.com hint: PICList Posts must start with ONE topic: [PIC]:,[SX]:,[AVR]: ->uP ONLY! [EE]:,[OT]: ->Other [BUY]:,[AD]: ->Ads