Close

Hack Chat Transcript, Part 2

A event log for Decapping Components Hack Chat with John McMaster

What lies beneath...

dan-maloneyDan Maloney 03/10/2021 at 21:150 Comments

Usagi Electric (David)1:03 PM
Thanks John and Dan for putting this one on!

devinsbench1:03 PM
@tubetime do you think you can sort of chip away the last layer very carefully?


https://hackaday.io/event/177775-retro-recreations-hack-chat

tubetime1:03 PM
@devinsbench yes but i can't do it without scratching the die

Miles Paulson1:04 PM
Thank you. I will reach out

devinsbench1:04 PM
Aah

JohnDMcMaster1:04 PM
@tubetime lol

JohnDMcMaster1:04 PM
I still have the corpse here if you want it...

Florent1:04 PM
Thank you @JohnDMcMaster ! It's always a pleasure to follow your twitter account.

devinsbench1:04 PM
Is it a test equipment corpse?

JohnDMcMaster1:04 PM
I can stick around for a bit more if people want to chat

JohnDMcMaster1:04 PM
I might just multitask a bit more

Cool, I'll wait a bit to pull a transcript. Thanks!

JohnDMcMaster1:05 PM
This will probably get decapped soon:

JohnDMcMaster1:05 PM
A few people requested these low cost caliper (oops)

Florent1:05 PM
@JohnDMcMaster multitasking is great but please just don't drink nitric acid instead of your coffee

tubetime1:05 PM
spicy

JohnDMcMaster1:07 PM

https://www.youtube.com/watch?v=GX4KcLDCiII

YouTube John McMaster

JohnDMcMaster1:07 PM
I'm also excited about this. I'm curious if anyone has guesses what I'm doing with that

devinsbench1:09 PM
Laser?

MS-BOSS1:09 PM
Exposing some photopolymer?

Meadhbh Hamrick1:09 PM
surface acoustic wave typification?

JohnDMcMaster1:09 PM
@devinsbench laser is a good guess, haven't heard that one yet (but not it)

Antoine Bercovici1:10 PM
I think you've been interested in recovering configuration in SPLDs for reverse engineering, is it done by simple observation or has it to be done electrically? I suppose it would be different from a OTP array and a EEPROM array?

JohnDMcMaster1:10 PM
I have a spare unit I'm going to try to revive (missing lamp) using a parts laser someone else has

JohnDMcMaster1:11 PM
Hi @Antoine Bercovici ! Yes, what you can do depends a lot on the specific technology. Sometimes for example the interface is secured or maybe even the protocol is unknown so it makes more sense to use brute force imaging to extract bits

JohnDMcMaster1:12 PM
Ex: EEPROM is hard to see under a microscope (usually SEM, sometimes AFM) so usually other methods are used (ex: disable security or microprobe bus)

Discussions