Yeah, I don't care that much about the tampered tag. Just noticed that it came back.
Sent from my HTC6435LVW using Tapatalk 2
Sent from my HTC6435LVW using Tapatalk 2
Are you on a stock kernel
Sent from my HTC6435LVW using XDA Premium HD app
Me? I don't have this device. Other s off devices I've run stock and custom ROMs/kernels. I most always have a custom recovery installed.
With s off,Once gone,I've never had tampered reappear no matter what kernel/recovery I have.
Sent from my ADR6425LVW using Tapatalk 2
thats strange... cause as soon as i unlocked and put a custom recovery on it it would say tampered/unlocked no matter what
That is true well you are still s on
Sent from my ADR6425LVW using Tapatalk 2
If we are talking strictly about getting the bootloader screen back to what it looked like stock, in case someone checks, what about getting the CID blurb gone? When I was stock, there wasn't even a CID on the screen. Now there is CID- 11111111 or CID-22222222. Just asking. Is there a way to change the CID back to what it was?
This is great news
So if I wanted to return my dna I would do this before I do s on?
No space... "Writesecureflag 3"
If you need to get back to 100% stock use this guide: http://androidforums.com/showthread.php?t=691213
Just make sure to use a DNA ruu not a one s ruu
Sent from my HTC One XL using Tapatalk 2
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Users\Scott>[COLOR="Red"]cd c:\mini-adb_vigor[/COLOR]
c:\mini-adb_vigor>[COLOR="red"]adb devices[/COLOR]
* daemon not running. starting it now *
* daemon started successfully *
List of devices attached
HTxxxxxxxxxx device
c:\mini-adb_vigor>[COLOR="Red"]adb shell[/COLOR]
shell@android:/ $ [COLOR="red"]su[/COLOR]
su
shell@android:/ # [COLOR="red"]dd if=/dev/block/mmcblk0p3 of=/sdcard2/mmcblk0p3[/COLOR]
dd if=/dev/block/mmcblk0p3 of=/sdcard2/mmcblk0p3
64734+0 records in
64734+0 records out
33143808 bytes transferred in 9.519 secs (3481858 bytes/sec)
shell@android:/ # [COLOR="red"]exit[/COLOR]
exit
shell@android:/ $ [COLOR="red"]exit[/COLOR]
exit
c:\mini-adb_vigor>[COLOR="red"]adb pull /sdcard2/mmcblk0p3[/COLOR]
2292 KB/s (33143808 bytes in 14.116s)
[COLOR="Blue"]*modify mmcblk0p3 with a hex editor[/COLOR]
c:\mini-adb_vigor>[COLOR="Red"]adb push mmcblk0p3mod /sdcard2/mmcblk0p3mod[/COLOR]
2478 KB/s (33143808 bytes in 13.059s)
c:\mini-adb_vigor>[COLOR="red"]adb shell[/COLOR]
shell@android:/ $ [COLOR="red"]su[/COLOR]
su
shell@android:/ # [COLOR="red"]dd if=/sdcard2/mmcblk0p3mod of=/dev/block/mmcblk0p3[/COLOR]
dd if=/sdcard2/mmcblk0p3mod of=/dev/block/mmcblk0p3
64734+0 records in
64734+0 records out
33143808 bytes transferred in 18.937 secs (1750214 bytes/sec)
shell@android:/ #[COLOR="red"] exit[/COLOR]
exit
shell@android:/ $ [COLOR="red"]exit[/COLOR]
exit
c:\mini-adb_vigor>[COLOR="red"]adb reboot bootloader[/COLOR]
c:\mini-adb_vigor>
So help me understand this... I still am on the stock SHIP HBOOT and I have the tampered and unlocked badge with s-off. If I want I can use the lock zip and it will lock my bootloader and clear the badges but I will be able to continue to flash and mod my phone with radios and what not as i am now? sorry if this sounds repetitive just trying to get a good understanding before i flash anything...
I flashed to the ENG hboot then back to the ship hboot and my **tampered** flag came back when I flashed back to the ship hboot. Do I have to be locked for it to stay gone?
Sent from my HTC6435LVW using Tapatalk 2