All posts filed under “Treacherous computing

Friend or foe: Battery-authentication ICs?

Lithium battery from Motorola V220Via MAKE, an article from Electrical Design News looking at lithium battery authentication chips in products such as phones and laptops, designed to prevent users fitting ‘non-genuine’ batteries.

Now, the immediate response of most of us is probably “razor blade model!” or even “stifling democratic innovation!” (as Hal Varian or Eric von Hippel might put it), and indeed that was probably my own instinctive reaction.

It’s not clear, though, that this is a standard architectures-of-control-enforced-razor-blade-model of the kind we’ve seen with printer cartridges. Read More