- Joined
- Mar 23, 2016
- Messages
- 2,209
- Reaction score
- 1,908
- Location
- Bavaria / Germany
- Website
- h-elsner.mooo.com
The build-in read protection of the STM32 processor family is not so easy to hack. I read nowhere that someone did it.As a next step you can reverse the flashing process and inject a small code, to read bootloader. Possible this or not IDK. But to read back the flash area should be possible. For sure there is a checking process after block writing.
EEPROM is a part of flash...
You need a licence file. FC checks it. Message57 uploads the licence. I don't wand to make this public because I wand not be responsible if someone makes thumb things...Take e look how the switches are handled via serial. As example NFZ. There should be more switches in FC. Commands are not encrypted (I guess).
"So, what is right? Can someone confirm, that Q500log2kml motor_status interpretation is right, with other words, when it says this motor is affected, is this motor affected then?"View attachment 31572
Again, this was my understanding up to now.
So, what is right? Can someone confirm, that Q500log2kml motor_status interpretation is right, with other words, when it says this motor is affected, is this motor affected then?
We use essential cookies to make this site work, and optional cookies to enhance your experience.