RE: A83: Re: Flash App Hacking


[Prev][Next][Index][Thread]

RE: A83: Re: Flash App Hacking




isn't it posible to use VTI to debug the code where this is done, and write
an own "Write App to Flash" routine?

-----Oorspronkelijk bericht-----
Van: Solignac Julien [mailto:x1cygnus@online.fr]
Verzonden: zondag 1 oktober 2000 13:50
Aan: assembly-83@lists.ticalc.org
Onderwerp: Re: A83: Re: Flash App Hacking



>Another speculation:
>can't we fake the validation part, and then jump to the part where the app
>gets written, or does the validation part involve flash writing too?

This is how the TI-ROM works:

1. Unlock Flash
2. Check If App Is Valid
 If Yes Write
 If Not lock Flash

There is no _unlockflash routine, the required code is implemented directly
before the validation sequence and if it fails flash is locked up. TI has
done a very good job, making it logically impossible to violate the system.
Physically it's another deal.

Solignac Julien
x1cygnus@xcalc.org
http://xcalc.org

Piracy is a victimless crime, like punching someone in the dark