This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How easy is it to steal?

Hello,

How hard is it really to backward engineer a .hex file distributed as part of a software update, and extract from it useful information about IP (I know there are decompilers available for practically all platforms but I never really used one)? I was considering encoding a software update file, decoding the data on the controller before IAP - but is it worth it?

Parents
  • We have a product specifically made for a market that it known to be infested with piracy, theft (sometimes government financed) and cheating. Some behavior of the discussed software if truly unique, allowing interfacing with equipment that seeks exactly that kind of behavior. But in the mean time, the off-shore manufacturer itself is demanding a slice of the IP, so it does not seem to head there...

Reply
  • We have a product specifically made for a market that it known to be infested with piracy, theft (sometimes government financed) and cheating. Some behavior of the discussed software if truly unique, allowing interfacing with equipment that seeks exactly that kind of behavior. But in the mean time, the off-shore manufacturer itself is demanding a slice of the IP, so it does not seem to head there...

Children