0 Members and 2 Guests are viewing this topic.
Quote from: lkj on March 03, 2012, 06:09:25 pmNo, with a little script to replace everything, swap case and so on before compiling I just thought it could possibly work for non-cx os files, but apparently not.Again, you know that keys.i doesn't have the actual keys inside, right? Therefore the output you get will still be encrypted.... unless you have the keys and stuck them inside of keys.i
No, with a little script to replace everything, swap case and so on before compiling I just thought it could possibly work for non-cx os files, but apparently not.
Teachers who depend on fancy calculators to teach, IMO, shouldn't teach at all. They, in fact, are bound to later get fired, and TI's lovely market of dumb teachers and students will fall.
Doesn't the ARM support protection rings? Why can't TI implement security through a kernel? They could mark most of the system RAM as being off-limits third-party software, preventing people from running the CAS OS on non-CAS models. With preemptive threading, they could ensure that PTT protections would engage when requested and have full effect. The only downside to this is that it would require TI to do some actual work---which costs money---, and understand complicated, difficult things like scheduling, resource tracking, least-privilege security, APIs, and such.