D
Deleted User
Guest
A contact of mine just sent me the following link to XDA News about someone that found a way to bypass SPFT authentication on a lot of MTK chipsets
https://www.xda-developers.com/bypass-mediatek-sp-flash-tool-authentication-requirement/
I had to repost this here because this is pretty important. Anyone that has a compatible phone/chipset can now read and write partitions with SPFT like the good old days. No authentication file? No problem. Just run this python script before connecting and in a few short minutes you'll have full read/write access to the phone's partitions just like you wanted to have. Full instructions for how to use the exploit are on the XDA post linked above
Here's a list of compatible chipsets copied from the XDA post. I assume there MIGHT be others that will work, perhaps they just didn't try all of them yet. But if you have one in this list it should DEFINITELY work according to the XDA post
https://www.xda-developers.com/bypass-mediatek-sp-flash-tool-authentication-requirement/
I had to repost this here because this is pretty important. Anyone that has a compatible phone/chipset can now read and write partitions with SPFT like the good old days. No authentication file? No problem. Just run this python script before connecting and in a few short minutes you'll have full read/write access to the phone's partitions just like you wanted to have. Full instructions for how to use the exploit are on the XDA post linked above
Here's a list of compatible chipsets copied from the XDA post. I assume there MIGHT be others that will work, perhaps they just didn't try all of them yet. But if you have one in this list it should DEFINITELY work according to the XDA post
- mt6261
- mt6572
- mt6580
- mt6582
- mt6735
- mt6737
- mt6739
- mt6755
- mt6757
- mt6761
- mt6763
- mt6765
- mt6768
- mt6771
- mt6785
- mt6799
- mt6873
- mt8127
- mt8163
- mt8173
- mt8695