Publié par Philippe le 11 Fév 2010 at 11:17
Tear down and hacking around gumpack camera
Update : The method and all the files needed to do it are available in the article : How to remove date and timestamp from gumpack camera
Update : datasheet of SPCA533A available !
Update : A software-only method have been made available ! Isoprop gathered all the needed steps in his tutorial. And it *is* working, without any soldering needed. Job done 😉 Thank him, and thank you dear readers for your grateful comments.
I recently bought a micro camera to put on my RC glider on ebay. I am happy with the quality, as it does video at 30fps and 720×480. You should look at my RC glider videos here. The issue with this camera is that it automatically inserts the date in the video, and that it is reset to 01-01-2008 each time it is powered on. After reading Chuck’s web site, I decided to open and try to hack my camera. Here is what I found.
The camera is often called « gumpack camera », due to its form factor. I have chosen this one as it would easily fit into my plane. It look’s like to have the same characteristics as the #3 camera. The image have the same size, and the timestamps inserted are the same. It uses a file « TAG.TXT » to set the date with a line starting with « [date] » .
TODO Photo camera plane
I didn’t manage to go into any system mode, and didn’t managed to get the webcam working. It’s always seen as a mass storage from the computer.
When plugged on my linux box, it shows theses VID/PID:
Bus 001 Device 010: ID 04fc:0171 Sunplus Technology Co., Ltd
It behaves as a mass storage device, and let you access the content of the flash card.
If you press the « record » button while in mass storage, it goes into webcam mode, and advertise itself as:
Bus 001 Device 012: ID 04fc:1528 Sunplus Technology Co., Ltd
To go in this mode, you should wait ~5 seconds after having plugged it. I haven’t tried the webcam drivers.
Electronics
So, what is inside ?
There is:
- LiPo 1 cell 270 mAh
- The camera sensor
- A 16Mbit (2MB) Flash SPI memory (cFeon F16-100HIP Q93H06A F921GDA, also called EN25F16). I managed to found the datasheet here : EN25F16.
- Some RAM : VT3664164T-6 (4Mx16bit SDRAM)
- And an ASIC : SPCA1527A
A reader (George S.) sent me the datasheet of the SPCA1528. Ok, to be more precise, it is more a « commercial sheet », that just show some example products. Thanks !
Another reader, Bob N, sent me a much more precise datasheet of a SPCA-533A. Thanks !
Here are some photos of the camera opened. Click on the images to get the full resolution.
The CMOS sensor seems a bit different than other models, as it is mounted on a small support. Here is a macro of it. It has 24 pins.
I can corroborate the Chuck’s assumption with the help of my oscilloscope. When the camera boots, there are lots of transfer from the flash SPI during one second or so. There is no traffic at all after, even when you start and stop a recording. When the camera is in « sleep » (all leds off but power button « on »), the flash chip is powered off. We can conclude that the SPI flash contains the firmware of the camera, and it is copied inside the RAM at boot time. So the code that inserts the date in the film is in !
I bought mine in November, 30th, 2009. On the PCB, it is written :
D004_V3090818
Villamany posted a comment with some photos of his own gumstick camera. The components seems to be the same (at least the chipset), but it looks a bit smaller. He bought it in December, 23rd, 2009. On his one, it is written:
D001_V7091114
The second line looks like a production date or something similar, in the format YYMMDD. I assume mine stays one month and a half in stock before being sold, and it is almost the same delta for him.
The second line seems to indicate a model and a version. According to the manual, I have a « DV D004 camera ».
Playing with crystals
Following the Spiners’s idea in the comments, I tried to remove the RTC crystal. When I switched on the camera, the green led lights, then the red one and that’s all. It doesn’t respond to button presses. It doesn’t show up on the USB port.
When I remove the main crystal (written 27MHz), NOTHING happens. No lights, no USB, no response to buttons. I then tried to underclock the main chip, and put a 18MHz crystal on it, just to see what happens 😉 A took a 15s video, counting the seconds. The funny thing is that the video is « accelerated ». It only last 8s. The sound is accelerated also and is treble. The probable explanation is that the avi file says it’s 30fps. But the chip didn’t output all the 30 frames during a second because it was underclocked. But at play back, the 30 frames were displayed, and looked like accelerated. The timestamp insertion was still there and stamped the video at the correct real time.
Battery and current
I made some current consumption measures:
- Switch « Off » : No current at all
- Switch « On », but in sleep : 0.02 mA (more than one year before battery down)
- Switch « On », with green led on : 115 mA (the current waveform shows a frequency around 15 KHz, hello RTC clock !)
- During recording, the camera consumes around 145 mA. There are some spikes at 220 mA every 64ms. It’s probably when the SD card is written.
I measured the battery capacity at 270mAh (discharge current of 200mA, down to 3.0V). So I expect it to be able to last a bit more that one hour.
The next thing to do is to dump the data 😉
Flash content
Once again, I had to make my own tools. You are never better served than by yourself ! At first, I would have preferred to not desolder completely the 8-pins flash, to not take too much risks. As this solution was not working, I removed it completely, and fit it on a standard 8-pin DIL package, with some wires. Although it is a bit dirty, this solution worked well ! I also added a small decoupling capacitor closer to the chip, as I noticed on the oscilloscope some spikes in the power lines. As you can see on the photo, I removed the LiPo battery. To be more precise, it removed itself, as the wires doesn’t bend easily and are very fragile. I suspect that some camera will die as the lipo can move inside the case and the wires will break.
Using an old AT90S2313 AVR micro-controller from Atmel, I made a SPI reader. The uC firmware was reading all the content off the memory and dump it by its UART to my computer. A python script was in charge of reading the data back, and write them to a « raw » file and a « intel hex » file. I should do another article on that …
The flash is 16Mbit, so it makes a 2MB file. It took me more than 7 minutes to transfer it through the AVR at 10MHz, and the UART at 57600 bauds. Around 400KB of the memory are « 0xff », which means unused space.
You can download the raw data and the ihex:
- gumpack_camera_flash.raw.bz2 (606K)
- gumpack_camera_flash.ihex.bz2 (1.1M)
Villamany managed to extract the firmware from both of his MD80 camera ! Here they are :
- MD80.bin.bz2 (622K)
- MD80bis.bin.bz2 (623K)
And Allan also sent me his camera firmware :
- allan-808-number3.bin.bz2 (624K)
Thank you for sharing them ! The firmware are mostly identical, but there are some differences. The strings are not always in the same order in the file, showing a new recompilation of the code. Some strings, like a date, are also different.
There are some interesting « strings » in the content. Here are only a few of them :
NAND RSVDCIM100MEDIASunplus SPCA1KCCurrent F/W version: %sD:\1528.BINISP.BINDRAMPARA.TXTBoot %s, %lu KBISPKEY.TXTFW.BIN1528.BIN=====AE Gid and Luma====="[date]Omnivision 3.1MSunplus CA1528fill [mem type] [+offset]dump [mem type] [start addr] [+offset] [end addr]adc s: Start adc testadc e: Stop adc testadc a: Start button testTask start successfulPress any key to start the test...No err has found in this test!Press 'r' to restart the test, other keys to exitTimeStyleMM/DD/YYYYDD/MM/YYYYwww.vividsound.com (206) 781-8498Adobe Photoshop CS2 Windows
Seeing this, I am happy to have dumped something without errors ! (I mean correct endianness, no bit inversion, no ciphering, no shift). They show some file names, such as 1528.BIN, or the well know TAG.TXT. The hexdump tool can also be used to « see » something:
00008af0 e4 9e fe e4 9d fd e4 9c fc 22 5b 64 61 74 65 5d |........."[date]|00008b00 00 25 62 78 2f 25 62 78 2f 25 62 78 2f 25 62 78 |.%bx/%bx/%bx/%bx|00008b10 2f 25 62 78 2f 25 62 78 0a 00 4e 6f 20 74 65 78 |/%bx/%bx..No tex|00008b20 74 20 66 69 6c 65 21 0a 00 44 3a 5c 44 43 49 4d |t file!..D:\DCIM|00008b30 5c 00 31 30 30 4d 45 44 49 41 00 25 73 28 25 6c |\.100MEDIA.%s(%l|00008b40 64 29 0a 00 73 70 69 5c 73 65 72 69 61 6c 5f 66 |d)..spi\serial_f|00008b50 6c 61 73 68 5f 53 54 2e 63 00 31 20 25 62 78 0a |lash_ST.c.1 %bx.|00008b60 00 30 78 32 35 30 30 20 25 62 78 0a 00 73 74 73 |.0x2500 %bx..sts|00008b70 20 66 61 69 6c 20 25 62 78 0a 00 0a 54 4b 20 42 | fail %bx...TK B|00008b80 20 00 46 2f 57 20 76 65 72 73 69 6f 6e 20 69 73 | .F/W version is|00008b90 20 25 73 0a 46 2f 57 20 63 6f 6d 70 69 6c 65 64 | %s.F/W compiled|00008ba0 20 40 20 25 73 2c 20 25 73 0a 0a 00 49 4f 54 72 | @ %s, %s...IOTr|00008bb0 61 70 20 25 62 78 0a 00 ef 64 0a 70 1c 30 98 11 |ap %bx...d.p.0..|00008bc0 e5 99 b4 13 0c c2 98 30 98 fd e5 99 b4 11 f6 c2 |.......0........|00008bd0 98 30 99 fd c2 99 75 99 0d 30 98 11 e5 99 b4 13 |.0....u..0......|00008be0 0c c2 98 30 98 fd e5 99 b4 11 f6 c2 98 30 99 fd |...0.........0..|
ARM Inside ?
Chuck supposed that the SPCA chip was powered by an ARM CPU, especially the 926EJS. I tried to run a ARM disassembler on the file and find out that no code is ARM. I know ARM processors quite well, and can confirm that it’s not ARM powered.
My collegue Gillou ran a dissembler for the following CPU architectures : avr, mips, h8300, SH, z80, m68k. Neither of them give result. But a 8051 worked very well !
Here is some code example :
L0584: 1B64 EF MOV A, R7 1B65 7802 MOV R0, #2hL0586: 1B67 C3 CLR C 1B68 33 RLC A 1B69 CE XCH A, R6 1B6A 33 RLC A 1B6B CE XCH A, R6 1B6C D8F9 DJNZ R0, L0586 1B6E 128AD8 LCALL L0587 1B71 128B81 LCALL L0588 1B74 6461 XRL A, #61h 1B76 6003 JZ L0589 1B78 028468 LJMP L0590
L0589: 1B7B A3 INC DPTR 1B7C E0 MOVX A, @DPTR 1B7D 6476 XRL A, #76h 1B7F 6003 JZ L0591 1B81 028468 LJMP L0590
Given that the 8051 uses variable length instruction, it’s very unlikely that we have good dis-assembly with a wrong architecture.
What’s next ?
Knowing the CPU, it’s time to disassemble the code and find where is the code that inserts this f*ing date in the image. If a good software guy can modify the code, I will have to do a circuit able to write into this flash memory to try it. There is also the string 1528.BIN in the raw file. We can suppose that this is a way the reprogram the flash more easily. Please use and explore the binary files.
More discoveries on the dump
By looking more closely to the strings, I noticed « JFIF ». It is present in the header of the .jpg images. The jpg images starts by the magic number 0xffd8 and ends with 0xffd9. I have made a python script (again !) that extracts all the data from the dump that starts with 0xffd8 and terminate by 0xffd9. I found 16 images, and here they are, with there start and end address in the dump file :
- recup_0090__0x093d42-0x0952fd.jpg (5.4 KB)
- recup_0120__0x0a967a-0x0aa535.jpg (3.7 KB)
- recup_0295__0x0b7192-0x0b871a.jpg (5.4 KB)
- recup_0316__0x0b871c-0x0ba247.jpg (6.8 KB)
- recup_0336__0x0ba248-0x0bb103.jpg (3.7 KB)
- recup_0391__0x0fa558-0x104e07.jpg (42.2 KB)
- recup_0406__0x0fa6a0-0x0fb4ad.jpg (3.5 KB)
- recup_0423__0x0fba2a-0x0fcdb0.jpg (4.9 KB)
- recup_0441__0x104e08-0x110f0d.jpg (48.3 KB)
- recup_0453__0x104f50-0x105ee2.jpg (3.9 KB)
- recup_0467__0x10644b-0x107b8d.jpg (5.8 KB)
- recup_0480__0x110f0e-0x113c83.jpg (11.4 KB)
- recup_0493__0x113c84-0x11fc89.jpg (48.0 KB)
- recup_0501__0x113dcc-0x114fb7.jpg (4.5 KB)
- recup_0511__0x115520-0x116dd2.jpg (6.2 KB)
- recup_0529__0x19b21c-0x19c7d7.jpg (5.4 KB)
This represent 209KB of beautiful photos isn’t it ? I am sure that if these Chinese had made more effort, they could have used a 8Mbit flash memory only, and gain a few cents more on each camera !
And even sounds !
This time, it was the string « WAVEfmt » that kept my attention. I managed to extract 128.6 KB of wave files by modifying a bit my script. The files starts with:
00000000 52 49 46 46 .. .. .. .. 57 41 56 45 66 6d 74 20 |RIFF....WAVEfmt |
Here are the 4 files:
- recup_0010__0x0a3d42-0x0aa576.wav (26.1 KB)
- recup_0020__0x0ad4f0-0x0aff8c.wav (10.7 KB)
- recup_0025__0x0b021c-0x0b5cf6.wav (22.7 KB)
- recup_0035__0x0bb104-0x0cc59a.wav (69.1 KB)
Extracting the font from the dump
Spinner and Bill W. have posted comments and methods to display « something » with the raw dump. Bill W. managed to see this:
We can see the numbers from 0 to 9 and the « / » and « : » needed to display date and time. We don’t know yet the encoding, but it looks promising. We can even recognize some Chinese characters. His explanations are here.
Spinner went a bit further, publishing this image in the comments with explanations:
On this one, the font is even more precise. (link to the original)
That’s really great work starting from a good idea from Bill !
Here are the characters we are looking for, extracted from the video :
Each character here is 16×24 pixels. So it fits quite well in bytes.
Address mapping of theses « fonts »
Following Spinner work, I cut the dump in part where « something » appear. Here is the result. If you click on the address range, you will get the raw data.
- 0x120000-0x130000:
- 0x130000-0x138000:
- 0x138000-0x13d000:
- 0x13d000-0x140880:
- 0x140880-0x141880:
- 0x141880-0x142880:
- 0x142880-0x143880:
The idea behind all this is to be able to change the font in the firmware so that all characters appears « transparent ».
I will try to write this into the firmware, and see what happens.
If the « 2 » has gone, it rocks ! I believe it is the same idea as Spinner, but I cannot access the file(rapidshare overloaded 🙂 )
Work done ! The « 2 » is out !
I made the soft to program the flash SPI, and program it with the tentative font with the « 2 » removed. Here is the result :
I removed all the other numbers, like the file submitted by spinner, and as expected, all timestamps have disappeared !
We still don’t really know the encoding of the font, when the firmware only show the following image, there is no timestamp:
The firmware change is only between 0x138000-0x13d000. Here is the corresponding part of the firmware with the transparent font:
0x138000-0x13d000_no_font.raw (20 KB)
So, work done, the timestamp is completely removed from my gumpack camera. Thanks to Chuck, Spinner, Bill W. and other people that posted great ideas in the comments. It took me a bit more that one week to achieve this.
Here is the final result :
Next thing to do is make this « easier » so that other people can use this information.
Update 10 march 2010
Villamany managed to remove the timestamp from his md80 camera too ! Here is his success : on this water rocket forum Congratulations !
Happy Hacking !
2 août 2011 à 13:06
A bit more info.
I’ve read through the datasheet on the SPCA533A camera controller and there doesn’t appear to be a way to control the frame rate there. It’s streamed through an almost completely hardware path from sensor to SD card. The CPU on there is just looking after the UI (on cameras that have one) and a few minor housekeeping tasks. Initialization is handled by this CPU, which I guess is why I managed to alter the sensor configuration.
In hacking rather than reading, I’ve experimented with the close_frame setting on the module again, but I can’t get that to do anything. I can get a video of the sensor test signal, which looks like a TV test card, by setting a bit in a debug register.
The really bad news is that I’ve now bricked my camera in a permanent looking way. It seems like the unbricking pads are permanently shorted, so I think I’ve zapped it with static. I wasn’t taking any precautions so I wouldn’t be surprised by that.
If I can get the datasheet for the Sunplus SPCA1528 or SPCA1527a then I’d love to read it and see what more can be done. Failing that, I think I’m going to go for the hardware (555 timer or PIC) option to take one still image every 4 seconds.
Cheers,
Geoff.
10 août 2011 à 03:42
Can someone here help me. I have a pair of video eye wear that has a SunPlusmm chip inside. Is this the same as SunPlus? The video and time stamp work fine, but there is a small band along the right hand side of distorted video, like a mirror edge. I’ve been given a file called 1528.bin and told to place it in the TF card (which I can only assume is the micro SD card) and then to power up the glasses and the firmware will be updated. Only it doesn’t. Is there a trick to this? Can anyone help? I can provide extra details…
Dan
23 août 2011 à 16:24
I’ve discovered a very easy way to permanently remove the timestamp without any hardware or firmware modifications. AFAIK this isn’t listed anywhere else on the Web.
Connect the camera to your PC, then create a file « time.txt » in the root directory of the camera, with contents e.g. « 2011.01.01 00.00.00 N ». No quotes and no line breaks; file size must be exactly 21 bytes. This has already been documented in various places; the only remaining problem is that the firmware deletes the file upon booting.
But there is a trick to prevent that pesky delete from happening: just make the file read-only! 🙂 It’s really that simple…
19 septembre 2011 à 20:53
I have a spy pen that scales up the video and records slowly because of this. Would I be able to get a better frame rate if I used a 35mhz crystal?
27 octobre 2011 à 12:48
My Gumpack-Experience :
I also recently bought a micro camera (30fps and 720×480. Sunplus)
and I got the wrong timestamp of 2008 too.
After reading the the whole stack of information of all the gumpack-explorers
I found the hints of « where to save the « DATE.TXT » where solving
the timestamp-problem.
After the timestamp was saved in the right way and place, the testvideos
showed the correct date and time each day.
Here is my Howto :
Via USB you should see the memorycard
with its folder DCIM on your PC screen.
Opening this folder shows the next folder
(in my card 100MEDIA) In this folder
I have the testvideo-files and
a saved example of the timestamp-file « prototype ».
It should look as the manual wants
TAG.TXT
(in this textfile I wrote in) :
[date]
2011/10/26
17:15:00
Of course you write your
actual date and time
and you made the blank lines
after each written line.
Now you save this « prototype »
in this last folder.
Now you copy the new created file « TAG.TXT »
and you save/paste it parallel
to the folder DCIM.
Insert the memorycard back to the camera.
If you take a video with the camera,
it grabs the actual date+time and delete the the file after,
because the camera keeps the new date and time
as a computer and from now it writes the daily correct timestamp
on each new video that is taken.
If you check the camera-memorycard with your computer,
you see no TAG.TXT file together with DCIM-folder. The camera
did the job.
If you ever need the TAG.TXT again (Battery down,or you reset the camera) find the first saved file, change the actual date+time or write completely new and copy as mentioned.
Happy gumpacking !
29 janvier 2012 à 18:42
[…] PHILIPPE conseguiu hackear o firmware de uma gumpack camera, que usa o mesmo chip da Eken 808, e removeu o […]
11 février 2012 à 21:27
I have one of these gum type cameras, and unlike most of you I need to use the date stamp facility, which of course is stuck on 2008.
I’ve tried Gumpack Explorer’s double tag.txt file trick but I’m still stuck in 2008
I don’t have a disc with it, I’ve managed to correctly insert the tag.txt file, but I don’t have the « time synchronisation file » which according to the instructions is on the disc.
a) does anyone have a copy of this file they can email me?
and
b) where does it go, in the root or in DCIM?
Many Thanks
Caz
11 février 2012 à 22:00
I think I’ve very nearly sorted it, I was doing a couple of things wrong, now it’s OK, until I turn it off and it reverts to 2008
Thanks for looking
3 mars 2012 à 19:24
Hi members,
any success on getting composite video out of this camera
27 avril 2012 à 18:48
I have 808 #3, but with bad accum
When I changing new accum I connecting + and – not in right position
Something wrong happening
But camera working good with usb connection as usb-disk and web-camera.
I tested chips and found that bad is: 212T, S4 and A10b (out =1,4V but must be 1,8V).
Help me – say me what are FULL NAMES of all chips on the board.
212T – ?
A10b – ?
And others.
Thanx for help!
10 juillet 2012 à 08:01
I’m guessing that the photos and sounds are because a LCD screen and speaker can be hooked to the camera, the photos are for the home screen(it starts in video and you can press the home button to access the photo, voice, playback, and maybe even music playback. I’ve another camera using a Coach(not sunplus) chip and it can do that
12 août 2012 à 23:33
NO MATER what i try on my md80 i still get usb connection error, and can’t do anything at all..is there any possibility that i can fix this?
3 février 2013 à 18:23
my Mini DV MD80 from ebay, it seems that not Sunplus, but anyka MMC USB Device Disk. Unable to remove timestamp. my timestamp is not yellow. this is black.
http://img163.imageshack.us/img163/6923/anykammcdiskusbdevice.jpg
http://img51.imageshack.us/img51/3429/46920202.png
Can anyone help me?
30 mars 2013 à 06:15
Has anyone tried to decipher the character encoding to try changing the timestamp color? Changing the font doesn’t seem to be a problem, seems to me that even changing the color into something more or less random would not be a problem. But with a bit of experimenting, I’d say the way the font pixel colors are stored could be deciphered so anyone could change the timestamp color to the exact color of choice.
What could be easily noticed is – each 16×24 character row is represented by the 32 bytes. The first 16 bytes correspond to the first 8 pixels, and the second 16 bytes describe the later 8 pixels in row. Seems as each pixel is represented by the three channels where the first channel has 8 bits per pixel and the other two channels have only 4 bits per the pixel (or 8 bits of the 2nd&3rd channel are for describing two pixels at once – it would be very easy to test which one is the case).
Here is the picture of what I mean:
http://img5.imageshack.us/img5/859/pixeldata.png
I have isolated the ‘zero’ character (the 32×24 green rectangle) from the representation of the hex dump. The character is divided into the left and right half – the left 8 and the right 8 pixels of the character. Let’s see how each of the first 8 pixels in a row is represented in the hex file (raw data):
As I’ve said – each pixel is represented by the three channels. We still don’t know what they are – they could be RGB, RBG, shifted RGB/RBG, RBG+alpha, … Let us assume the three channels are R, B and G. I have marked the R, B and the G data of the very first pixel of the character with the corresponding red, green and blue colors.
As can be seen, the green and the blue chunks of data control the first TWO pixels (marked with red). As said before – green and blue channels might be 2 times 4 bits per corresponding pixel, or they might be 8 bits per TWO corresponding pixels, someone will have to do the simple test if one of these assumptions is correct (as there are more than just these two possibilities).
After these assumptions I was trying to figure out what the B&G data might be so I took the data for the very first visible pixel of the character ‘zero’. I took the hex editor and looked at the corresponding offsets and the data for the first (yellow) pixel is:
0xe1, 0x01, 0x94
If we assume the B&G data controls two pixels at the time, then the data for the second pixel in a row is the same as for the first one. Why would we assume the B&G data is for the two pixels? After examining the font, I noticed not even one SINGLE pixel in a row. That is – every horizontal pixel we can find comes in a pair so there is probability the B&G channels control ‘double’ pixels.
The next was to try to compare the RGB representation of the yellow (0xff, 0xff, 0x00) with the (0xe1, 0x01, 0x94). What color would the data represent if it is not RGB but is RBG data (I think there are some picture file formats with the reversed G&B channels)? The color would be (0xe1, 0x94, 0x01) and that *is* some kind of the yellow (however not the same as in the timestamp).
As we can see, the very same pattern can be applied with the next 8 pixels (the right half) of the character data and the next thing I assume is – one of the colors is reserved as the transparent (similar to storing the index of the transparent color in transparent .gif’s file format). Looking at the raw data (from the img_extract_03_0x138000-0x13d000.raw hex dump) the transparent color is:
0x00, 0x80, 0x80
Unfortunately I couldn’t make any further assumptions without flashing the EN25F16 with the altered data and seeing the results. In fact, I don’t even have the camera we are talking about – I have a MD80 clone that has arrived just yesterday. But if someone would do a few experiments flashing the 0x138000-0x13d000 area with some altered values, I think it wouldn’t be too difficult to decipher the exact color coding of the timestamp font pixels.
The first thing I would do would be to change all 0xe1 values of the ‘R’ channel of yellow pixels to see what would be the resulting color. Then, by changing the B and the G data, and observing the results – more could be found about how the color is stored in the corresponding 24 bits of each timestamp pixel.
What could be even more interesting would be to see the disassembly of the whole .hex dump, trying to isolate the code which reads the 0x138000-0x13d000 area. After locating that code, it might be not to difficult to ‘poke’ the .hex altering just a small number of the instructions, so every pixel from the font table would have been ‘read’ as transparent – regardless of the actual data.
I hope someone who already has set everything to be able to read/flash the device, would find this interesting and do some experimentations.
11 novembre 2013 à 12:51
[…] http://www.pluc.fr/2010/02/tear-down-and-hacking-around-gumpack-camera/ […]