>> But you are missing the point. By making the ICSP connection available, >> by bringing out the PGM connection, then anybody can do anything to the >> code in the devices you are producing. > > >No way! If the part is code-protected, the only thing one can do is to >erase the part. After erasing then he can do whatever he wants (program, >debug, read, etc.), but the original firmware/bootloader will not be >there anymore. Exactly, but why make it easy for someone to do this, and potentially damage the reputation of your company by loading your device with rogue code? >> By having a bootloader it is possible to set most chips up so that the >> bootloader is protected against erasure, and it ensures that whatever >> does get downloaded is from a controlled source. The bootloader can only >> be erased if the PGM connection is brought out to the outside world. > > >Even if you cut the ICSP pins close to the package, somebody could >scratch the plastic to solder some wires to them. He could even unsolder >the chip and buy a new blank one. Agreed, but why make it easy for them, by having all the connections openly available? >It is not possible to ensure that nobody will damage the equipment or >erase the firmware. What you should be worried of is to protect the >intellectual property inside it. If your customer damage the equipment, >lucky you, he will need to buy a new one. Well, there are two points here. One is if someone damages the item to a point where it doesn't work any more then you get to sell them a new one. Great, more money in your pocket! But if you make it easy for someone to reprogram your device, by making all the ICSP connections readily available, then you stand a good chance of having your product reputation damaged by someone loading your product with code that does rogue things. Your product looks totally undamaged, complete ex your factory, but doesn't perform to your specification. It is YOUR reputation that gets bad mouthed, and you sell less because of it, not more. The problem then is that the reputation gets carried over to any other product you produce ... There are enough hackers out there that seem to figure this is their job for life, that making it easy for them to do so is stupid. -- http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist