>> From: Chris McSweeny >> How reassuring. I often worry about people stealing data from my batteries. >> Seriously, what is the application for this? > On 12 November 2014 12:05, Charles Craft wrote: > Authenticating the battery belongs in the device: > "Authentication devices range from simple identification features to > secure cryptographic products using an SHA-1 HMAC. " > A counterfeit battery might be bad in these categories: > "Portable medical > Diagnostics, insulin pumps, heart rate monitors, blood glucose monitors > Military > > Radio, night vision devices" > For many values of "belongs". which may be of merit in some cases - such as the ones Charles noted Or > > >> Or, to achieve other ends. > 'This product is intended only for use with the high quality [tm] over-priced batteries sold by xxx corporation.' Which may be of merit in some cases :-). For some values of 'merit' R --=20 http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist .