Eh, I'm against the whole DRM/serial number thing. In 1982 it might have had some use for Apple, Inc. Today it's just an annoyance to be avoided.
LisaEm will let you set anything you want on purpose. This is to allow you to get whatever values are used off a real Lisa via use of the service mode, and make it available to LisaEm, so that way if you use BLU to copy an installed system you can still get the tools to run.
By default newer LisaEms will set the serial number to all zeros (with some sync bytes), this is the "magic serial number" that will prevent the DRM from working even if it does serialize a tool (since all zeros indicates unserialized).
AppleNet isn't used by any software in LOS AFAIK, while cards exist, there doesn't seem to be any software in LOS to make use of it in any way. Hopefully in the future when/if LOS source code is released, perhaps it might include some info/code about AppleNet proper.
Right now we don't think serial numbers are necessarily sequential, and can't be used to estimate the total number of Lisas made directly, so we'd have to use the "Tank" algo and a spreadsheet to do that..
I did add a small tool to decode the actual VSROM which might be of interest to you:
https://github.com/rayarachelian/lisaem/blob/master/src/tools/src/decode-vsrom.c if you wish to pursue this further. You might be able to use some of this code as an example to generate valid serial/AppleNet IDs. The purpose of this tool is to allow you to use an EEPROM burner to read the VSROM and get at the serial number info without having to install it on a CPU board, power up the Lisa, and use BLU or Service Mode to get at it, etc.
It's possible that the AppleNet card boot ROM may have some more hidden details about the AppleNet ID number in some form, though it does seem to have rudimentary boot code. Tom might have done some work on this, not sure.
The deserialize tool (
https://github.com/rayarachelian/lisaem/blob/master/src/tools/src/los-deserialize.c ) will now work on hard drives as well and will remove not only the serial number but the copy inhibition flag (I call it bozo-bit which is in line with the original Mac System bozo-bit that was later removed.) There's also a tool that will let you enable the bozo bit (
https://github.com/rayarachelian/lisaem/blob/master/src/tools/src/los-bozo-on.c ), but this just sets a flag that prevents LOS from allowing you to freely copy a tool.
So, since AppleNet IDs don't seem to be used for anything on LOS, I didn't bother with any of that. The source code to the "H" Boot ROM is available and does some checking of the serial/applenet checksum data as it comes off the VSROM (see the code around 0BF6, and checksum routine at 0CB2 - note that this is different from VFYCHKSM which is used to checksum the boot ROM itself). You might look at that code as well. Perhaps if it was important, I might add a button to fix the checksum bytes of the serial # based on the "H" ROM code at 0CB2, but... doesn't seem to matter.
In an unrelated vein, there's something even more interesting to me. LOS documents are checksummed and this checksum is somehow changed if there's a password set.
The data in the document itself remains in plain text - so this is not encryption in any sense of the word and you can see the whole text of the document with lisafsh-tool, but you just can't mess with it in any way, if you do, LOS will refuse to open the document no matter what, saying it's damaged. I think this is what John Couch referred to as "The Lisa has document data protection but the Mac does not" (paraphrased) in his new book.
I've not been able to reverse engineer this, but I've noticed that when you take a document that's unprotected and set a password, the Desktop Manager will create a new inode for it with a new checksum, and destroy the original one. For example if you have a LisaWrite document and it lives at inode 123, once you set a password on it, the document itself will remain the same, but the new inode will have a new checksum (and possibly a flag that indicates this).
I tried to mess around with simple passwords like a single char like "a" and then "b" and see if there's some pattern, one did show up, but it behaves differently based on the size of the password and spaces, etc. Seems to be adding characters, but I'm unsure of the full algo.
So effectively what this means is that if you have a plain text document, you can't just feed it to the Lisa and make it look like a LisaWrite document, it won't be accepted by the Desktop Manager. Best we can do right now is copy & paste from the host machine to the keyboard into a document. i.e. it breaks modern day data transfer of a document to LOS from, say your macbook pro.