On Sun, 2007-03-25 at 00:04 +1200, Jinx wrote: > a little more ;-), could Dwayne be certain that his product would > actually fall into the hands of a hardware hacker anyway ? Guess > it has to fall into the hands of just one ..... Every time I've seen a dongle bypassed it had nothing to do with the hardware, the hack was accomplished by bypassing or replacing the "dongle check" in the software, no hardware hacker needed. If instead you contain some of the "functionality" in the dongle, then it's likely some hardware "hacking" will be required, but even then a man in the middle attack in the software layer may be enough to crack the scheme (depending on how you do things). Finally, let me add, that very often people crack these things NOT to pirate, they crack them for the challenge, and just release the result for fun. TTYL -- http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist