RE: A83: Re: Flash App Hacking
[Prev][Next][Index][Thread]
RE: A83: Re: Flash App Hacking
Does this mean Apps can be signed on a hacked calc, and than be transferred to a non-hacked calc, and WORK?
I guess we'll still need an AppTran program to send it to the hacked calc in the first place, am I right?
Greets,
Peter Martijn
-----Original Message-----
From: Solignac Julien [SMTP:x1cygnus@online.fr]
Sent: Saturday, October 07, 2000 9:14 PM
To: assembly-83@lists.ticalc.org
Subject: Re: A83: Re: Flash App Hacking
>Is the validation info written in flash with the app, or is it recreated
when the app is transferred??
>is it is recreated with each transfer, we could try to phisically hack a
calc, and then in essence signing it on the calc..
The validification routines are all about page 1Fh a starting point is 64D7h
(md5 sub routine), validation info is written each time an app is
transferred (page 1Eh) to the calc and read every single time it's run. The
only thing that is written once for all is base code validification (about 3
bytes). Physical hacking is a good/great idea, there's only a single wire to
short circuit to do so: the #WE pin on the flash chip.
Solignac Julien
x1cygnus@xcalc.org
http://xcalc.org
Piracy is a victimless crime, like punching someone in the dark
____________________________________________________________
Get your FREE personal .com domain name and
NAMEzero Personal Portal at: http://www.namezero.com.
For customer service, mailto:customerservice@namezero.com.
- Warning
- Could not process part with given Content-Type:
application/ms-tnef
Follow-Ups: