Categories

Sega System 16 security reverse engineering

Posted on Tuesday, June 19th, 2018 in reversed by DP

sega-programmer

Reverse engineering of Sega’s System 16 Hitachi FD1089 cpu security module by Eduardo Cruz:

I’m glad to announce the successful reverse engineering of Sega’s System 16 cpu security modules. This development will enable collectors worldwide preserving hardware unmodified, and stop the general discarding of Hitachi FD modules.
The project is right now involving external testers so expect further details and full disclosure over the coming weeks.

Further details on Arcade Hacker blog.

Check out the video after the break.

This entry was posted on Tuesday, June 19th, 2018 at 11:02 pm and is filed under reversed. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Michael: A feature I've wanted forever is a dual RX UART mode, so I can watch both sides of a UART communication between devices (right now...
  • Alex B: To see the current commit hash, "git rev-parse HEAD"
  • Daniel: Very nice! Welcome to this century...
  • chrismec: What is this Bus Pirate v5? Is this the demo board or is there a new bus pirate in the works?
  • John Peck: Really impressive! Thanks for putting so much documentation together!