| ??? 01/10/03 15:15 Read: times |
#36138 - RE: paranoia |
However, many clients do have data that is woth protecting. Take a look at the link I posted above.
That is not protecting "the code" that is protecting "the feature table". A feature table can, of course, be programmed into the actual code of the chip and would then depend on the lock bits, this, in my opinion is the wrong approach. A feature table should be encrypted and quadruple checksummed and have a "chip match code" to avoid copying a full features table into another system. This would be the right approach for a features table, not lock bit dependency or such. The article seems to blame technology when the problem is that the approach is wrong. Erik |
| Topic | Author | Date |
| lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| well Rauf | 01/01/70 00:00 | |
| RE: lock bits Jez | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: paranoia | 01/01/70 00:00 | |
| RE: paranoia | 01/01/70 00:00 | |
| RE: paranoia | 01/01/70 00:00 | |
| RE: paranoia | 01/01/70 00:00 | |
| RE: paranoia | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: Michael | 01/01/70 00:00 | |
| RE: IJAZ | 01/01/70 00:00 | |
| RE: Michael | 01/01/70 00:00 | |
| RE: lock bits | 01/01/70 00:00 | |
| RE: Donald | 01/01/70 00:00 | |
| RE: Donald | 01/01/70 00:00 | |
| RE: Rob | 01/01/70 00:00 | |
RE: Rob | 01/01/70 00:00 |



