WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

466

At least on Poal, we all know protecting software using DRM or encryption is futile: it can always be bypassed.

Today, reverse engineering hardware is just as simple. Just look back at the XBOX. (hackaday.com) It turns out a glitch attack did the trick.

I never had the hardware to perform a glitch attack or frankly, the desire, but now there's glitch attack hardware (hackaday.com) that takes the guess work out of it.

WhitePeopleThings.

At least on Poal, we all know protecting software using DRM or encryption is futile: it can always be bypassed. Today, reverse engineering hardware is just as simple. Just [look back at the XBOX.](https://hackaday.com/2024/10/19/a-robust-guide-to-the-xbox-360-glitch-hack/) It turns out a glitch attack did the trick. I never had the hardware to perform a glitch attack or frankly, the desire, but now there's [glitch attack hardware](https://hackaday.com/2025/03/01/the-bus-pirate-5-sure-can-glitch/) that takes the guess work out of it. WhitePeopleThings.

(post is archived)

[–] 1 pt

Spectre and Meltdown say hello.

In all seriousness though, I doubt any computer hardware doesn't have backdoors anymore. Just a matter of which your willing to deal with, long term.