![]() It is likely that the running variant has been modified in some ways, but the original recovery is always a good reference, if you are messing with it. The source for that can be found in the AOSP recovery repository. I have not checked at which phase it fails, but as the root-key will not match the one fused into the device, I doubt that it will be possible to run some downloader if there is no leak of a properly signed binary. I have been able to send a firehose downloader for some msm8909 based device to the phone and it at least acceppted the elf-header but the execution of the loader finally failed. This mode normally also allows to load the eMMC emergency downloader (firehose) to the device. This includes the SHA256 hash of the root key used for signing the qualcomm binaries, which happens to beġ357fdaeabb7becbe49095f000d9d3dadf198885106d98598cac6d1b9b2edb3a This mode for example allows dumping device fuses. The device will now respond to the Sahara protocol. ![]() If you use lsusb, you will see a line like thisīus 001 Device 002: ID 05c6:9008 Qualcomm, Inc. If you enter this mode, the display just flashes with the KaiOS logo and then turns black.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |