| ??? 08/10/00 04:00 Read: times |
#4288 - RE: Encrypting code |
- What's meant by CPU stuffing ??
- And if busting the security bits is that easy, why isn't that too common, and available as commercialized service by the hackers ? - I think the ultimate way out is the security bits and without letting your client looking a bit of your code even the testing one. What I do is after getting into a commitment, I only dowload the code into flash of fresh micros the customer gives me. O'course I never forget locking the bits. OR The best ultimate way out is let's all "mob" the ATMEL to make its micro as the most secure ones. Babar/ |
| Topic | Author | Date |
| Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| RE: Encrypting code | 01/01/70 00:00 | |
| 89c1051 | 01/01/70 00:00 | |
Interference elimination | 01/01/70 00:00 |



