Enlarge / A look inside the circuitry of a “decapped” arcade chip. (credit: Caps0ff ) The community behind the Multiple Arcade Machine Emulator (MAME) has gone to great lengths to preserve thousands of arcade games run on hundreds of different chipsets through emulation over the years. That preservation effort has now grown to include the physical opening of DRM-protected chips in order to view the raw code written inside them—and it’s an effort that could use your crowdsourced help. While dumping the raw code from many arcade chips is a simple process, plenty of titles have remained undumped and unemulated because of digital-rights-management code that prevents the ROM files from being easily copied off of the base integrated circuit chips. For some of those protected chips, the decapping process can be used as a DRM workaround by literally removing the chip’s “cap” with nitric acid and acetone. With the underlying circuit paths exposed within the chip, there are a few potential ways to get at the raw code. For some chips, a bit of quick soldering to that exposed circuitry can allow for a dumped file that gets around any DRM further down the line. In the case of chips that use a non-rewritable Mask ROM , though, the decappers can actually look through a microscope (or high-resolution scan) to see the raw zeroes and ones that make up the otherwise protected ROM code. Read 5 remaining paragraphs | Comments
Originally posted here:
MAME devs are cracking open arcade chips to get around DRM
An anonymous reader shares a report: A mysterious piece of malware has been infecting hundreds of Mac computers for years — and no one noticed until a few months ago. The malware is called “FruitFly, ” and one of its variants, “FruitFly 2” has infected at least 400 victims over the years. FruitFly 2 is intriguing and mysterious: its goals, who’s behind it, and how it infects victims, are all unknown. Earlier this year, an ex-NSA hacker started looking into a piece of malware he described to me as “unique” and “intriguing.” It was a slightly different strain of a malware discovered on four computers earlier this year by security firm Malwarebytes, known as “FruitFly.” This first strain had researchers scratching their heads. On the surface, the malware seemed “simplistic.” It was programmed mainly to surreptitiously monitor victims through their webcams, capture their screens, and log keystrokes. But, strangely, it went undetected since at least 2015. There was no indication of who could be behind it, and it contained “ancient” functions and “rudimentary” remote control capabilities, Malwarebytes’s Thomas Reed wrote at the time. Read more of this story at Slashdot.