Get the latest tech news

Reverse Engineering Franklin Bookmans


Aiming to uncover and preserve eBook history: Franklin BOOKMAN

DBS-1 and DBS-2 had 32KB RAM, 160x40 dot matrix resolution 3.0 MHz CPU clock DBS-2 has a serial port interface capable of 1200 - 19200 bps DBS-2 has a DAC that provided audio output via 3.5mm jack ES-1 was an ASIC created by Franklin for its products (likely Bookman2 and Bookman3) Referred to in a press release in 1997(as it ramped up production to add to Bookman2 and Bookman3 designs) 24-bit addresses were possible as evidenced by serial communications with Bookman3 WD(write database) command This means the Bookman2 and Bookman3 could address up to 16777215 bytes (~16.78MB) Bookman2 and Bookman3 emulated the 65C02 to provide backwards compatibility with Bookman1 ROM content The 6502bench might be useful as an option to disassemble the ROMs from these devices. The encryption likely involved the BOOKMAN Desktop Manager's PID (unique to each copy of BDM, as it was generated from the serial code printed on the CD-ROM's sleeve) ROM card titles are transmitted in unencrypted format when BDM is writing to the BMC card BOOKMAN Devices almost certainly did not have enough RAM to run any sophisticated decryption processes!

Get the Android app

Or read this on Hacker News