The very earliest versions of popular bit copiers were pure nibble
copiers--like Locksmith 1.0, Nibbles Away, etc.
These programs read each track into a large buffer (more than one
revolution), then searched for the large gap (usually the end of
the track) and wrote the data between the two large gaps to the
target disk, assuming that the nibbles between epilogs and prologs
were self-sync nibbles.
Since a .nib image represents track data without sync identification,
just as early nibble copiers, it has the same information as those
copiers had. This data can be written to a disk with essentially the
same result as the early nibble copiers.
So, assuming that the .nib contained enough information to successfully
run the program, the nibble-written disk should also be usable.
Of course, if the protection scheme used more information than was
captured in the .nib, the disk would be detected as a copy, but
that's just the way it is...
There is one complication that must be dealt with in writing the
nibbles to a disk: the speed of the target disk must be slow
enough to fit all the relevant nibbles, and, if a rotation is
somewhat longer than the track data, provision must be made for
padding the nibbles with something that will not cause problems.
Typically, writing a lot of additional sync nibbles before writing
the track data will do the job.
-michael
NadaNet 3.1 for Apple II parallel computing!
Home page:
http://home.comcast.net/~mjmahon/
"The wastebasket is our most important design
tool--and it's seriously underused."