Posts in Year 2015

TeaTime - An Experiment

Suppose you are an independent game developer. You are facing piracy and fake copies of your game, and you do not have the legal and economic power to handle this problem. You want to continue making games without getting discouraged by pirates, who most likely reside in other countries.

What do you do ? How do you prevent or reduce the incentive to pirate your game through reverse engineering ?

Read More →

First Post!

Our interests in the field of reverse engineering, embedded hardware and cryptography will be the main feature of this blog. As a team of reverse engineers and developers, we encounter a variety of systems in use that are past manufacturing date or are not supported anymore. We help recover, repurpose or build modules to enhance such systems while maintaining their original purpose.

Read More →