A "hardware hacker" A Hector Martin.
For example, a hardware hacker can reverse a Kinect and then make it do what they want it to. One Hector Martin.
Martin said he was going to use the "prize money on more tools and devices for additional hardware-hacking."
What does that entail?
What knowledge is needed to reverse engineer hardware in such a manner.
Resources? Books? Tools?
I'm sure a hardware hacker like Martin could apply his knowledge to the DSTwo, if he wanted to.
Where does hardware hacking hit the cryptology wall? Where does it fade into programming?
I was thinking about posting this to the GBATemp question/answer. Do you think that appropriate?
For example, a hardware hacker can reverse a Kinect and then make it do what they want it to. One Hector Martin.
Martin said he was going to use the "prize money on more tools and devices for additional hardware-hacking."
What does that entail?
What knowledge is needed to reverse engineer hardware in such a manner.
Resources? Books? Tools?
I'm sure a hardware hacker like Martin could apply his knowledge to the DSTwo, if he wanted to.
Where does hardware hacking hit the cryptology wall? Where does it fade into programming?
I was thinking about posting this to the GBATemp question/answer. Do you think that appropriate?