In 1980, Franklin Computer released the Franklin Ace, a clone of the Apple II designed to run identical software. The company replicated nearly every aspect of the Apple II, including its ROM-based software and documentation—even leaving "Apple" in place of "Ace" in some manual sections. Sold at a lower price, this move infuriated Apple, leading to a lawsuit. Apple ultimately won, forcing Franklin to withdraw the Ace from the market.
Uncertainty in Court and Compatibility Claims
Although Apple prevailed, the outcome was uncertain until the end. Franklin argued that copying Apple II ROMs was permissible, claiming they were a "functional mechanism" required for software compatibility. This raised concerns that a more sophisticated clone could exploit similar tactics against the Macintosh.
Preparing a Stealthy Countermeasure
Steve envisioned a dramatic courtroom demo: typing specific keystrokes into a cloned Mac would trigger a "Stolen from Apple" message on-screen. The challenge was embedding this feature invisibly in the ROM so cloners couldn't easily locate or remove it.
Designing the Hidden Icon
Susan designed a distinctive "Stolen from Apple" icon featuring prison bars. To save space and obscure detection, Steve Capps' compression method was used to shrink the icon. A small routine was written to decompress, scale, and display it. The code was hidden within data tables to evade disassembly.
Activation and Internal Testing
Triggering the icon required entering the debugger, typing a six-digit hexadecimal address, and pressing "G" (to execute the routine). The team demonstrated it to Steve, who approved. They hoped a clone would emerge just to showcase their clever defense.
A Deterrent Through Secrecy
No commercial ROM copy emerged, making the trap unnecessary—but the team leaked rumors of the hidden icon as a deterrent. This sparked curiosity, with at least one hacker becoming mildly obsessed with finding it.
The Hunt by Steve Jasik
Steve Jasik, creator of the MacNosy disassembler/debugger, learned about the icon and set out to find it. Living in Palo Alto, he frequently crossed paths with the team, sharing theories—often incorrect—and seeking hints.
The Final Breakthrough
After two or three years, Jasik cracked it. Upon encountering him again, he revealed the compressed icon and the routine's address. It remains unclear whether he solved it independently or received insider assistance.
Comments
Join the conversation
Sign in to share your thoughts and engage with the community.
Loading comments...