An operator in Johor Bahru called me last month with a question I hear at least once a week: “I have 12 fish tables from 2017. The mainboard is the original IGS Fish Hunter board. Can I add anti-cheat protection without replacing the entire board?” His machines were showing 8-12% credit variance, and he’d already identified Bluetooth relay activity on three of them. He didn’t want to spend $1,500 per machine on a full board replacement when the games themselves still worked fine.
The short answer: yes, in most cases you can add anti-cheat protection to older machines without replacing the main board. The longer answer depends on what type of communication bus your machine uses, whether the main board has accessible debug ports, and what specific cheat methods are being used against your machines. Let me walk through exactly what’s possible, what’s not, and how to tell the difference before you spend any money.
What “Adding Protection Without Replacing the Board” Actually Means
There are three distinct approaches to protecting an older machine without a full board replacement. Each works at a different layer of the machine’s architecture, and each addresses different attack vectors.
Approach 1: Inline communication bus encryption. This is the most common and most effective approach for older machines. The anti-cheat module sits between the main game board and the I/O controller (or between the main board and the payout controller). It encrypts the data passing between these components so that a Bluetooth relay or signal injector can’t read or modify the commands. This approach preserves the original main board, the original game software, and the original payout logic. It adds protection by making the communication unreadable to external devices. Cost: $80-130 per machine. Compatible with roughly 70% of machines manufactured after 2012.
Approach 2: Peripheral protection modules. These protect specific vulnerable peripherals — coin acceptors, bill validators, ticket dispensers, and credit add buttons. Instead of protecting the main board, you protect the entry points where credits are added to the machine. A peripheral module sits between the coin acceptor and the main board, encrypting the “coin inserted” signal so that a voltage injection attack can’t fake coin signals. This approach is cheaper ($40-80 per peripheral) but provides narrower protection — it stops credit addition attacks but not payout manipulation or score modification. Best for crane machines, coin pushers, and redemption games where the primary attack vector is fake coin signals or manipulated credit buttons.
Approach 3: External monitoring with alerting. This approach doesn’t prevent cheating in real time but detects it and alerts you. A small module reads the communication bus passively (read-only, no encryption) and looks for patterns that indicate cheating — repeated command sequences, abnormal signal timing, or known cheat device signatures. When it detects something, it sends an alert to your phone or lights an LED on the machine. Cost: $60-100 per machine. Not as good as real-time prevention, but much better than nothing, and it works on machines where you can’t modify the communication bus for technical or warranty reasons.
Which Machines Can Be Protected Without Board Replacement
The compatibility question comes down to the communication protocol used between the main board and peripheral devices. Machines manufactured after 2012 typically use one of three protocols: RS-232/485 (serial), I2C (inter-integrated circuit), or proprietary manufacturer protocols (IGS, Namco, Sega, etc.).
RS-232/485 machines are the easiest to protect. The anti-cheat module intercepts the serial communication between boards and encrypts it. Most fish table machines from 2013-2019 use RS-485 for the communication between the main board and the I/O controller. Inline encryption modules for RS-485 are widely available and cost $80-120. Compatibility: approximately 85% of machines using RS-485. The main exceptions are machines where the RS-485 lines aren’t broken out to an accessible connector — you’d have to solder directly to the PCB, which most operators aren’t comfortable doing.
I2C-based machines are harder but still possible. I2C is a short-distance protocol (typically within the same PCB or between stacked boards). Intercepting I2C requires a module that sits directly on the I2C bus, which means either a custom PCB that stacks on the existing board or a cable that plugs into an existing debug/ expansion connector. About 40-50% of I2C-based machines have an accessible connector. For the rest, you’d need to solder, which adds $30-50 in labor per machine.
Proprietary protocols (IGS, Namco, Sega) require manufacturer-specific modules. IGS fish table main boards (the most common in Southeast Asia) use a proprietary variant of RS-485 with IGS-specific framing. You need an IGS-compatible encryption module — a generic RS-485 module won’t work because it doesn’t understand the IGS framing. Fortunately, IGS-compatible modules are widely available since IGS machines are so common. Cost: $100-140. Compatibility: approximately 90% of IGS machines manufactured after 2014.
Machines manufactured before 2010 often use parallel communication or custom digital signals that don’t map to standard protocols. These are difficult or impossible to protect with inline encryption. For these machines, your options are peripheral protection (Approach 2 above) or board replacement. If the machine is generating less than $300/month in revenue, board replacement usually isn’t cost-justified — just retire the machine.
Real-World Installation Examples
Let me share three specific installation examples from recent jobs so you can see what’s involved.
Example 1: 2016 IGS Fish Hunter 6-player. The operator had 8 of these machines, all showing 6-14% credit variance. We used an IGS-compatible inline encryption module (model AC-IMS-01) that plugs into the RJ-45 connector between the main board and the I/O controller. Installation time: 12 minutes per machine. No soldering, no firmware changes, no game software modification. After installation, credit variance dropped to 0.8-1.4% across all 8 machines. Cost: $112 per machine x 8 = $896. Monthly revenue recovery: approximately $680 (based on before/after comparison). Payback period: 1.3 months.
Example 2: 2015 Namco crane machine (crane game with prize vending). The main vulnerability was the credit add button — players were triggering it with a voltage injector. We used a peripheral protection module on the credit button line (model AC-PPM-02). It encrypts the signal from the credit button so that only a properly timed, encrypted pulse is accepted. Installation: 20 minutes per machine (needed to run a new wire from the credit button to the module location). Cost: $65 per machine. This didn’t protect against all possible attacks, but it closed the most common entry point. The operator reported a 70% reduction in unexplained credit additions after installation.
Example 3: 2013 Sega Fish Table (older protocol, limited documentation). The machine used a proprietary Sega communication protocol that no off-the-shelf encryption module supported. We used an external monitoring module (Approach 3) that passively reads the communication bus and alerts on suspicious patterns. It doesn’t prevent attacks in real time, but it tells the operator exactly when and on which machine an attack is happening. Cost: $85 per machine. The operator checks the alert log daily and physically inspects any machine that generated an alert. He’s caught two cheaters in three months using this approach — not as good as real-time prevention, but effective enough given the limitations.
Frequently Asked Questions
Q: Will adding an inline encryption module void my machine warranty?
If your machines are under manufacturer warranty (typically 1-2 years from purchase), then yes, installing third-party hardware will void the warranty. For machines from 2017 or earlier, the warranty has almost certainly expired, so this isn’t a concern. If you have newer machines under warranty, check whether your distributor offers a manufacturer-authorized anti-cheat module. Some distributors now include anti-cheat as a warranty-friendly add-on.
Q: Can I install these modules myself or do I need a technician?
For machines with accessible connectors (RJ-45, USB, or manufacturer-specific plugs), most operators can install the modules themselves in 10-20 minutes per machine. The module comes with a wiring diagram, and you’re essentially unplugging a cable from the main board, plugging it into the module, and then plugging the module’s output cable into the original destination. If your machine requires soldering or custom wiring, hire a technician — the labor cost is $30-80 per machine depending on your location.
Q: What if my machine doesn’t have an accessible communication port?
You have three options: (1) Have a technician solder wires to the main board’s communication pins ($40-60 labor per machine), (2) Use peripheral protection instead of inline encryption (Approach 2), or (3) Replace the main board. Option 1 is the most cost-effective if you have multiple machines that need the same modification. Option 2 is cheaper upfront but provides less protection. Option 3 is the most expensive but gives you a modern board with built-in anti-cheat.
Q: How do I know if the module is actually working after installation?
Test it by attempting a known cheat method (if you know one) or by using a signal generator to inject fake signals into the communication bus. If the module is working, the machine should either ignore the fake signals or trigger an error condition. Alternatively, monitor credit-to-cash variance for 2-3 weeks after installation — if variance drops below 2%, the module is working. If variance stays above 3%, the module isn’t properly installed or isn’t compatible with your machine.
What to Do Next
Identify your machine’s main board model and manufacturing year. Look for a label on the main board that shows the model number and date code. Send me this information and I’ll tell you exactly which anti-cheat approach is compatible with your machines and what it will cost. For most machines manufactured after 2013, inline encryption is possible without board replacement and costs $80-140 per machine. The alternative — ignoring the problem and hoping cheaters don’t find your machines — costs 5-15% of your monthly revenue indefinitely. Which option sounds more expensive?