then it takes a lot longer, and it's time to use another attack at the same time. again, there is gear that can detect the surface charges on an operating chip with enough resolution to see any signal on the surface or not blocked by metalization, and lets you do molecular beam epitaxy as well to modify chips, it's meant for development use on asics, but the reverse engineering possibilities are huge. potentially, you could strip off layers of the chip and read the rom directly! it's just not worth while most of the time, for most people. and of course with non-disclosure/non-cracking agreements it's not popular in legal circles and a lawsuit and injunction can get expensive very quickly for the defendant without too much cost on the part of the "victim"... Falcon Wireless Tech Support - KF4HAZ wrote: > > If the bootloader is capable of addressing bytes to change > a field update can be applied without sending the entire object code. > And of course somewhere in the process part of the 128bit # gets changed > so the password will be different for each subsequent update. ----- > http://mailman.mit.edu/mailman/listinfo/piclist -- Philip Stortz, mad scientist at large -- "It is sobering to reflect that one of the best ways to get yourself a reputation as a dangerous citizen these days is to go about repeating the very phrases which our founding fathers used in the struggle for independence." -- Charles A. Beard _______________________________________________ http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist