Capsure pwned

Capsure Hacking #3 Third post on this topic, see also post 1(JTAG connections) - and post 2 (USB decoding) . So after the Capsure USB hacking , and with a little more knowledge (which can be a dangerous thing*) (*see later) what can we do with access to the flash memory? The bootloader has a built in "view NAND" tool (see end of last post ), in there we can see the contents but there's no direct download/upload option, *but* we now have a JTAG connector on this board added in the first post . How hard can it be? I pull out a full memory dump, I *think* this means I've got a copy of everything. (*see earlier 'danerous thing' comment) so blunder ahead. Where's the memory We have a little bit of knowledge from the datasheet which I've been poring over: So what can we change? What effect will it have? I'd been intrigued by that QC firmware I'd accidentally installed earlier which complained about FW incompatibility, and looking at the full...