RE: A83: Re: Flash App Hacking


[Prev][Next][Index][Thread]

RE: A83: Re: Flash App Hacking



Does this mean Apps can be signed on a hacked calc, and than be transferred to a non-hacked calc, and WORK?

I guess we'll still need an AppTran program to send it to the hacked calc in the first place, am I right?

Greets,
Peter Martijn

-----Original Message-----
From:	Solignac Julien [SMTP:x1cygnus@online.fr]
Sent:	Saturday, October 07, 2000 9:14 PM
To:	assembly-83@lists.ticalc.org
Subject:	Re: A83: Re: Flash App Hacking


>Is the validation info written in flash with the app, or is it recreated
when the app is transferred??
>is it is recreated with each transfer, we could try to phisically hack a
calc, and then in essence signing it on the calc..

The validification routines are all about page 1Fh a starting point is 64D7h
(md5 sub routine), validation info is written each time an app is
transferred (page 1Eh) to the calc and read every single time it's run. The
only thing that is written once for all is base code validification (about 3
bytes). Physical hacking is a good/great idea, there's only a single wire to
short circuit to do so: the #WE pin on the flash chip.

Solignac Julien
x1cygnus@xcalc.org
http://xcalc.org

Piracy is a victimless crime, like punching someone in the dark


____________________________________________________________
Get your FREE personal .com domain name and                 
NAMEzero Personal Portal at: http://www.namezero.com.       
For customer service, mailto:customerservice@namezero.com.	 

Warning
Could not process part with given Content-Type: application/ms-tnef

Follow-Ups: