…if a company copied the Mac ROM into their computer, he would like to be able to do a demo during the trial, where he could type a few keystokes into an unmodified infringing machine, and have a large “Stolen From Apple” icon appear on its screen. The routines and data to accomplish that would have to be incorporated into our ROM in a stealthy fashion, so the cloners wouldn’t know how to find or remove it.
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground” – Adafruit’s Apps!
Maker Business — Steve Ballmer Serves Up a Fascinating Data Trove
Wearables — Chalk it up
Electronics — Look to ferrites (no, not ferrets, the European polecat) when faced with high frequency
Biohacking — A Run in the Altra IQ Smart Shoes
No comments yet.
Sorry, the comment form is closed at this time.