On Wed, 12 Nov 2014, RussellMc wrote: >>> From: Chris McSweeny >>> How reassuring. I often worry about people stealing data from my > batteries. >>> Seriously, what is the application for this? > >> On 12 November 2014 12:05, Charles Craft wrote= : > >> Authenticating the battery belongs in the device: >> "Authentication devices range from simple identification features to >> secure cryptographic products using an SHA-1 HMAC. " >> A counterfeit battery might be bad in these categories: >> "Portable medical >> Diagnostics, insulin pumps, heart rate monitors, blood glucose monitors >> Military >> >> Radio, night vision devices" >> > > For many values of "belongs". > which may be of merit in some cases - such as the ones Charles noted > > Or > >> >>>> Or, to achieve other ends. >> > > 'This product is intended only for use with the high quality [tm] > over-priced batteries sold by xxx corporation.' > > Which may be of merit in some cases :-). > For some values of 'merit' While I applaud the effort involved in ensuring my batteries wont=20 defligrate in my lap, I do wonder if this is one of those applications=20 where it is actually worth a counterfeiters time and money to circumvent. Let's face it, low volume low cost isn't worth the trouble - but high=20 volume low cost... especially when you can charge a rediculas premium?=20 Heck throw in a 50% discount and you'd still be making rediculas money! Regards Sergio Masci --=20 http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist .