Thanks for those presentations SgtRock.
I was aware that Apple was using the default keys. In my opinion, the engineers there are a little full of themselves. I actually talked with them a couple times, and they thought there was no need for security, as nobody will ever figure this stuff out. LOL
So yes, Apple is what I would call the "Low Hanging Fruit". The truth is, that even given full knowledge of how the firmware works, you would be unable to cause a safety problem. But that doesn't mean a hacker couldn't cause some damage!
The issue is that there is a secondary protection IC, (TI, Maxim, Mitsumi, and Seiko make them) that if the pack ever gets close to an overvoltage condition, it will blow the Permanent Failure (PF) fuse. I think the part that Apple doesn't get, is that a hacker could easily go in, and change the charging voltage requested by the pack in the Smart Battery Gauge (Since they foolishly used the default sealing password), and change the overvoltage thresholds for the primary protection provided by the Smart Battery Gauge.
The charger is not a true Level 2 or 3 SMBus charger, so it actually pays no attention to the charge voltage requested, and is hardwired to put out the correct value. But by changing the primary protection thresholds, and disabling any cell balancing, a hacker could cause a cell voltage imbalance, which results in an overvoltage on a cell, that then triggers the secondary protection. The secondary protection would then blow the PF Fuse, which disables the pack. This will likely take many charges to occur, but since there is no real security as Apple uses the default password given by TI, it is quite possible to write a virus that could cause batteries to eventually blow their PF fuses.
I have seen the other manufacturers be more rigorous in their approach. The HP, Dell, Lenovo, and other major laptop packs I have seen, do bother to implement a real password. I have yet to see examples of those passwords get hacked.
I have seen an example of a RIM battery pack for a mobile phone that was very hackable, even though it was using a password. It used a very simple CRC, actually two seperate 16 bit CRC style passwords. The issue is that the security chip they chose, actually offers a way to attack them one at a time, which along with the hardware knowledge of how the CRC works, made the password very crackable. I know RIM was looking at getting away from that security scheme, but don't know if they did or not.
I found the "Battery E2Prom Works" software to be interesting, but of no real threat. They are just repackaging what you can get in an EV-Kit from TI or Maxim. (I didn't even see where they said it worked with the Maxim parts.) It did say that if the battery gauge IC came back reported as "sealed" you needed to assume the part was "Dead" and replace the part. So, this makes it possible to rework a pack, but you would need to replace the IC. I know that Dell also implements some other items in the pack, that if the values are not programmed correctly for that model, the Dell will refuse to charge that battery pack. I didn't see any special mention for Dell, so I assume that software doesn't know the requirements for the different models, and will not work with those Dell packs. (This is a fairly recent change, about the last year, so wouldn't be surprised to have software like that not yet dealt with such packs.)
So, I am interested in anyone who does have an example of a laptop pack that actually implemented a non-default password, that has been cracked. I would be interested in seeing such information, in case anyone here does know of those.
But, the links to some of the stuff that people have shown, is a good example of why the manufacturers are worried... at least those who don't have Apple's, "We Are Gods", attitude. LOL