Lmfao!!! We all speak google translate sapphire...I speak google translate. Does that help?
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Lmfao!!! We all speak google translate sapphire...I speak google translate. Does that help?
Assistant to ceo?
LOL hopefully your still kidding since yen cost more the USD and ZTE pays there developers pretty good.She's involved in the Iran branch. I was kidding. I'm sure I can hit a Chinese developers price pretty easily.
Im new to all that firehose stuff as that was never introduced till this year now that manufactures are starting to use it more to fix bricked devices.I'm still interested in stitching a firehose
We know for sure they have to be signed?Im new to all that firehose stuff as that was never introduced till this year now that manufactures are starting to use it more to fix bricked devices.
qpst was what we had to use with them before, but were never able to stitch one together since it has to be signed.
What do you mean stitching?I'm still interested in stitching a firehose
Before you can even load using a firehose it verifies the certificate to show it is authentic to the board so it does not cause more damage to a bricked device.We know for sure they have to be signed?
A firehose is just a file containing locations and various other things. If they arent signed, we can take the cpu of one firehose, the emmc of another, and the platform of a third and compile them together.What do you mean stitching?
My mistake your right they use renmibiWhen did the Chinese start using yen?
Beautiful thinking.A firehose is just a file containing locations and various other things. If they arent signed, we can take the cpu of one firehose, the emmc of another, and the platform of a third and compile them together.
Good theory. I'll post a link to the firehouse for the axon 7. Give me a min.I don't know if the firehose uses the same keys from the phone, but you can pull those and decrypt them with OpenSSL.
View attachment 117453
Won't work.Throwing this out there...
https://www.leakite.com/2016/06/revised-how-to-unbrick-qualcomm-android.html
From most of the stuff I've seen it wouldn't surprise me if it was.My GPU kills OpenSSL hashes, the problem being the string most likely isn't plain text unless they were lazy enough to do KEY_[KEY]. So decrypting could be a bit difficult.
If you pull the hash, I'll start decrypting.From most of the stuff I've seen it wouldn't surprise me if it was.
Mine is different.If you pull the hash, I'll start decrypting.
Won't work.
adb shell
su
dd if=/dev/block/mmcblk0 of=/storage/sdcard1/backup.img bs=512 count=30535646
We don't have dd write/read permissions in /dev/*
And if we had su, we wouldn't be in this trouble.
And, it uses a firehose incompatible with our phone. prog_emmc_firehose_8936
Nevermind I'm an idiot. I see the hash right there. At least it isn't salted.If you pull the hash, I'll start decrypting.
I'm not sure. That's something new.Can we do anything with the verity key? It's in the root directory. / (Not /root/)
It's what is preventing us from modifying anything.
https://drive.google.com/file/d/0BxeDOZaHE8y5Nzh1eTY0bnNLTnc/view?usp=drivesdkI'm not sure. That's something new.