Remove All Ads from XDA

Statistics

Total Posts
General Information
  • Join Date: 3rd January 2008
  • Referrals: 0

Most Thanked

Thanks
Post Summary
94
Enjoy. Don't forget to thank beaups too, he discovered the eMMC backdoor and exploited it! THIS WILL NOT WORK ON GALAXY S3/GALAXY S4/GALAXY S6|e/Galaxy S7|e. It will NOT work on AT&T More info on doing this: here DON'T UPDATE YOUR BOOTLOADER TO...
32
Just an update, surge and I were doing some reverse engineering yesterday on the new 4.4.2 aboot. We were able to understand the MODE: DEVELOPER mechanism a little better. The problem with reversing pseudo-code/Assembly is that it's essentially a ...
28
WARNING: This is very dangerous. I have been able to reproduce and recover every time, but there is a HUGE inherent risk of permabricking. I am able to manually put my device into QHSUSB_BULK mode by overwriting SDI/DBI with SBL1. The screen will ...
26
Enjoy. Don't forget to thank beaups too, he discovered the eMMC backdoor and exploited it! Disclosure: I do not own a Note 3. The exploit happened to be applicable to the Note 3, and we compiled it for your devices rather than not release it at a...
24
E:V:A We've been waiting for this for awhile. I/WSOMACP (21188): XCP_FEATURE_SECURITY: 4369 This appears to be the SECURE SECBOOT VAL (4369) from the Secure Boot status menu inside the Hidden Menu/RIL. On top of this it gets better. I made a ...