From: wxfield@shore.net (Warren)
To: cypherpunks@toad.com
Message Hash: c2084055a8a9f1fb4686be827568856197ccc322ab2f8913454b2c873275d95c
Message ID: <v02140702ade7e09bc9e6@[204.167.110.224]>
Reply To: N/A
UTC Datetime: 1996-06-15 08:25:44 UTC
Raw Date: Sat, 15 Jun 1996 16:25:44 +0800
From: wxfield@shore.net (Warren)
Date: Sat, 15 Jun 1996 16:25:44 +0800
To: cypherpunks@toad.com
Subject: Fuseable Links - no guarantees??
Message-ID: <v02140702ade7e09bc9e6@[204.167.110.224]>
MIME-Version: 1.0
Content-Type: text/plain
I have never paid much attention to the protection of firmware or the
technical issues revolving around such schemes...was wondering:
I recently saw an add for a UK based group that says they can take a PIC
OTP micro and read the prom (for a fee, of course) - How the heck is this
done?? I have my suspicion that they (somehow) magically peel off the
ceramic coating (without destroying the chewy center), get a circuit mask
and 'micro probe' the I/O of the IC...they then download the secret recipe
to the afore mentioned 'chewy center'.
Is this close to accurate?? How is it 'done' ???
-Just Curious
Return to June 1996
Return to “wxfield@shore.net (Warren)”
1996-06-15 (Sat, 15 Jun 1996 16:25:44 +0800) - Fuseable Links - no guarantees?? - wxfield@shore.net (Warren)