Moderators: Dave Moll, Andrew Davie, Steve Anderson
Steve Anderson wrote:Andrew, if you are successful with this you may be able to sell the code to JYETECH.
What I don't understand is I assume this processor has some form of code protection as per PICs. How were these people producing fakes able to get a hold of it? Did they forget the code protection or did an employee smuggle it out for a price?
Steve A.
Steve Anderson wrote:Yes, I believe code-protection can be circumvented, but it requires one clever bod to do it. But I guess there quite a few out there who can do so - probably for a fee.
Open-sourcing it may be a slight problem. It's designed to run on their hardware, without consent you may have some trouble brewing. I suggest asking permission at least.
The average user probably wouldn't be able to burn the device anyway.
Steve A.
Andrew Davie wrote:A few assumptions there - and you've had a go at me in the past for making assumptions, so my turn...
They actively encourage people (and explain how) to update the firmware when they release new versions. So burning isn't a problem.
Steve Anderson wrote:The first of the '$15 Specials' is complete, I've left off various connectors as I intend to eventually encase this device so the BNC for example would be located on the front panel.
So it's time to apply some volts and tune for maximum smoke...
Steve A.
Users browsing this forum: No registered users and 44 guests