Hi all,
I have no idea what I'm doing and don't expect an answer, but general nudges in the right direction.
I have a specialised piece of equipment (ddg search shows nothing for model no.) that keeps track of the number of "uses" each accessory has left, and you're forced to buy another one when it runs out. Basically like a printer and ink cartridge.
The two ways I can think that it's doing this is that either the counting is being done on the machine itself or the counting is being done by a chip on the accessory, I'm banking on the latter otherwise you'd be able to share one accessory between two machines.
Does anyone know how people went about defeating/hacking/resetting ink cartridges back in the day?. So that I have somewhere to start from? I think it's do-able because we're not talking HP that have the motivation or need to have extreme encryption.
Hi all,
I have no idea what I'm doing and don't expect an answer, but general nudges in the right direction.
I have a specialised piece of equipment (ddg search shows nothing for model no.) that keeps track of the number of "uses" each accessory has left, and you're forced to buy another one when it runs out. Basically like a printer and ink cartridge.
The two ways I can think that it's doing this is that either the counting is being done on the machine itself or the counting is being done by a chip on the accessory, I'm banking on the latter otherwise you'd be able to share one accessory between two machines.
**Does anyone know how people went about defeating/hacking/resetting ink cartridges back in the day?**. So that I have somewhere to start from? I think it's do-able because we're not talking HP that have the motivation or need to have extreme encryption.
(post is archived)