So who wants to send there card off to get the software hacked out of it
Adobe.
Look Here -> |
LOl i'll chip in $100 towards it
When you do things right, people won't be sure that you have done anything at all
From their FAQ section;
Is it legal to get service from Mikatech?
Mikatech deliver its services for educational purposes only, it can be illegal to use above mentioned services in some coutries or regions, please check your local laws. Mikatech does not take any responsibility in relation to the use of above mentioned services that may be considered illegal.
It's hard to make a come back when I havn't been anywhere
I finally got my head together, now my bodies falling apart.
為什麼不做你被塞滿
years ago where I worked we had a scanning electron microscope that could be used for looking at chips once you cut the tops off. Oh how it would be good to have access to that type of stuff now.
Leroy
you need to send original and 2 blanks
what blanks?
another place that specialises in reverse engineering micros
No, not I.
Energy is the father of creation
Yeah, it's a Z80 processor...
Joking. But I bet he knows. He's independantly wealthy, has free pay tv and won't tell anybody how to do it. Methinks he is manufacturing them
As I understand, to be able to scan layers of a chip is just the first step. Then you have to have an intimate knowledge of microchip manufacturing technologies to be able to decypher what you are seeing.
A lot has been written about that kind of thing. I happened to have on hand but there are several more recent ones floating about.
The security experts have been saying for years not to trust proprietary algorithms, not to trust hardware protection alone, and not even to trust hardware + mathematics because most hacks are done 'out of band', ie tricking the system into giving up its data via a channel its designers hadn't considered. Yet year after year we see the usual suspects flogging their snake oil security products, all commercial-in-confidence, none of them having undergone peer review. They think by keeping their source code and mask blueprints under lock and key, and by keeping their specifications and SDKs under NDA, and by restricting distribution, that they'll somehow be secure - more secure than if they'd heeded the experts' recommendations. People like Foxtel and Austar who swallow the marketing lies and buy crap like that only have themselves to blame for lost revenue when their systems are hacked. If they wanted a secure system they'd use peer-reviewed public domain encryption technology and they'd undergird it by cutting their prices, which would remove most of the demand for piracy. (It's like terrorism: you guard against it not only by following best practice security procedures but also by making efforts to be a good citizen and not making enemies unnecessarily. But try telling that to people who'd rather throw money at a Star Wars shield! )
That may be a bit harsh....
If we believe the irdeto2 source code that is floating around (aka the gamma source) is correct, irdeto2 is protected by TDES which has been subjected to peer group scrutiny and which remains widely used worldwide in finance and other areas requiring security. The algo is known but remains secure due to the keysize.
In the case if the source code, it would appear that decapping a chip and jtag'ing it may not give up the keys because they are stored in flash encrypted (with TDES) and are only decrypted when used.
I guess with sufficent money and appropriate technology nothing is impossible, but the cost and technology required is beyond most hobbiests.
ag
Energy is the father of creation
Bookmarks