Hacker Newsnew | comments | show | ask | jobs | submit | Two9A's commentslogin

Not including the Dragon 2's pad-abort test, which is ostensibly next week. That may slip, though.

reply


I remember that there were multiple userbase attempts to lobby Wikimedia for this in the past. Looks like Coinbase's recent partnering successes have made the difference, in this case at least.

-----


Some of these "userbase" attempts involved doing some things that people perceived as unethical (e.g. bribes) and caused damage that took effort to undo.

-----


I have, in the past, been forced to type an Xmodem transfer program into debug.com's hex mode, to get to the point where I can transfer files over a null-modem connection from another box. I can dig up the file in question, if that'd help you out at all.

I ended up typing it in 1k at a time, and independently typing in a CRC32 utility to check that I'd done it properly.

(That was to install Windows 98 on a computer with no drives, if I recall. So, not so very long ago.)

-----


That's how I used to transfer files to my coding buddies.

On the phone, hex dump in S-record format, then read out loud while the other side would type in the line. Checksum matches? Next line...

Our respective parents were not too happy about this unplanned usage of their phone lines but it saved a ton of cycling.

-----


That's how you do it! What's the today's equivalent that kids do?

-----


Yes, I would love to find that specific program - as there are several Xmodem transfer programs out there and I'd like to use one that's not only small in size, but also most likely to work.

-----


I seem to recall that imaging the bootloader ROM straight off the silicon was how the original Gameboy's bootloader was finally pulled out.

I just forget who did it, which is unfortunate.

-----


I spent a fair bit of time trying to find an article or something about this, but came up empty. I was especially curious to know how you can decode the program's bits from the silicon.

I found a similar idea here: http://members.iinet.net.au/~lantra9jp1/gurudumps1/decap/ind... The photo in the upper-right looks like it could reasonably be turned into binary, if you knew what you were looking at.

Anyone have any more info about how this actually works?

-----


Currently on mobile, will update tomorrow.

Start here:

http://www.visual6502.org/

Somewhere in that site they detail the step by step process of decapping, delayering photographing and identifying the logic.

There's also a JavaScript simulator, check it out.

The CCC also had a few lectures about decapping. The most interesting one is about backside scanning the die to bypass the safety features.

-----


The CCC backside attack is here:

https://www.youtube.com/watch?v=dtviiOJ-2hI

It contains lots of info and technical details.

Another one:

https://www.youtube.com/watch?v=KVmpBPbGPsQ

This is what an actual ROM looks like:

https://docs.google.com/document/d/18IGx18NQY_Q1PJVZ-bHywao9...

As the last image shows, the ROM table values are extracted by graphics processing the photo.

It's also possible to dump the ROM by reading it byte by byte, but this depends on the architecture (not always possible) and is typically done for mask ROMs that contain data.

-----


Thanks a lot!

-----


See my lecture notes: http://security.cs.rpi.edu/courses/hwre-spring2014/Lecture9_...

-----


The utm_* parameters tend to be used for source tracking; the important ones here being "content" and "campaign".

Of course, this particular link doesn't refer to HN in its campaign code, so their statistics are going to get a little confused.

-----


I've no idea.

Maybe HN doesn't like the fact that OP is posting so much in the comments?

-----


Unsurprisingly, this has been done.

https://www.multipool.us/

(Guess it goes to show there are no new ideas left in the world...)

-----


Not yet. Cryptsy, at the very least, are working on a DOGE/USD market; I know there are other exchanges doing the same, but I forget which.

-----


There's a vanity address generator, which bruteforces private keys until it finds a corresponding public key that matches your desired pattern.

I forget where the generator lives, but it runs locally and eats CPU for hours.

-----


For what it's worth, the table at the bottom of Dogecoin Average links directly to each market used to calculate the price.

(Except Coined Up; I've requested API access to their price lists, it may be a little while.)

-----

More

Applications are open for YC Summer 2015

Guidelines | FAQ | Support | Lists | Bookmarklet | DMCA | Y Combinator | Apply | Contact

Search: