Quote:
|
Originally Posted by Bongle
I think the bigger problem is that the RC has its radio channel set in hardware with the little switches, so you wouldn't be able to communicate with any other RC's.
|
That's on the OI. The Controller scans radio channels until it finds one with its Team number (which is set when you tether it). After that, it stays on that channel.
Quote:
|
Originally Posted by phrontist
It really comes down to the "Master Processor." Is that programmable? More importantly, is the code that drives it available?
|
It's as programmable as the user proc. but it's code is on non-volatile ram (Flash, eeprom, etc.). The code that runs it is the firmware update. So if you can decompile it, find a loop hole, and exploit it, you'll be able to make the first FIRST virus!
Quote:
|
Originally Posted by phrontist
I figured they wouldn't give that up, and thats probably a good thing. The question remains however, whether the "proprietary radio system," could be reverse engineered.
|
Yes. It's RS-422. You make a spy cable similar to the one found on
BeyondLogic.org.
Quote:
|
Originally Posted by phrontist
I'm (fairly) certain it's impossible to get the actual code from the microcontroller.
|
From not
For. Decompile the firmware and the libs.
Quote:
|
Originally Posted by Venkatesh
I don't remember if the PIC is a Harvard or von Neumann (sp?) system. However if it cannot execute stuff from the data parts of the processor, overflows will be very hard indeed.
|
Remember, the controllers themselves are from Microchip,
not IFI. They are probably more forthcoming on info than IFI is.
Of course, the packets are continuous, so it delimits them. This nature makes it very dificult to create a buffer overflow.
And above all, if they catch you, you didn't hear it from me.