You are reading a single comment by @Gordon and its replies. Click here to read the full conversation.
  • Yes, a malicious customer could read out obfuscated code in flash memory - but it is compressed, and fragmented over the memory space.

    It's a hugely difficult task to do anything with. I would find it very hard, and I wrote it. Maybe try it yourself and see what you can do? Personally I'd say it's more difficult than reading the ARM Thumb assembly code created by normal C compilers.

    Honestly, if you're worried that somebody may be willing to totally recreate your software and hardware from scratch and fake it, then you'll need to hire a specialist to design the software for you - not try and make it yourself.

    Sure, you could use compiled C code and turn on the 'flash protection' bit, but I can pretty much guarantee that won't stop a skilled group of people with infinite time and resources from faking it.

About

Avatar for Gordon @Gordon started