Well, I can say when hacking a chip, one can send a variety of voltage amounts, which we called JIGGLE back then, and eventually the secured chip, and suddenly there was the code on my computer screen. I admit to nothing, I know nothing. Well I do know one thing. I meta a Russian guy some years ago who was entering secured Microcontroller chips, for his doctors, and replacing the burned fuses, and reading the sram chips contents inside the microcontrollers. Again, I admit to nothing, i know nothing.
Oh I know another something. I met Microchip engineers, who opened up to me regarding reverse engineering, and they were doing that as well. Again, I admit to nothing, I know nothing.
Oh I know another thing. Some guys were building data stream capture devices, and then placing the captured data stream into a hex file, arranged by virtue of the lines of the commans, showing the first byte as the first byte, the last byte as the line checksum number. Each line of command had a line checksum number thus one could separate the lines of command. That is until they began to scramble each line of command.
I am not going to go any further right now...
Melbeta
Oh I know another something. I met Microchip engineers, who opened up to me regarding reverse engineering, and they were doing that as well. Again, I admit to nothing, I know nothing.
Oh I know another thing. Some guys were building data stream capture devices, and then placing the captured data stream into a hex file, arranged by virtue of the lines of the commans, showing the first byte as the first byte, the last byte as the line checksum number. Each line of command had a line checksum number thus one could separate the lines of command. That is until they began to scramble each line of command.
I am not going to go any further right now...
Melbeta
Comment