Originally Posted by lowkeyst4tus
...Any help would be appreciated.. This thread got quiet.. What you guys working on
Hello, I'm here.
I'm not trying to toot my own horn, but I want to help and I think I'm more than capable. Let me say some things about myself (not being vain) just to see if I could get a pointer as to how I can start helping.
I'm a problem solver. I'm a coder. I learn new things really quickly, especially when they are complicated. I've rooted and ROMed and tweaked out many different phones and tablets, and discovered my own exploits to get things done on the PC side of things.
Unfortunately my experience with "lead-climbing" in the phone and tablet universe is limited. I mean I've mostly just followed posted instructions to carry out my roots, etc.
So while I want to help get root for this device, I don't want to brick it either. I have several older phones to experiment with, but most of them have root and rom available online already. What can I do to start getting into the thick of it and help discover new content? I want to (and believe I'm capable) bring something useful back to this community that has helped me through the years.
The most important thing in owning a device IMO is debloating and installing a root firewall.
If any vets want to take me under their wing, or give me some training style projects, I would be all over that. Anything to get me caught up so I can start making my own solutions.
In the mean time, I'm going to see if I can track down this unlock.bin and reverse-engineer out the dev-ID and IMEI, as I think that's the key to making an unlocker for the Stylo 4.
Edit: I think these guys
were attempting to figure out LG's algorithm for creating the unlock.bin. They discovered the bin file is basically a file header with a 2048 bit RSA key tacked on. Since the exact input string, as well as the private cipher key is unknown, it becomes virtually impossible to RE the algorithm. The best advice I saw is to monitor the hardware of an LG when the fastboot flash unlock unlock.bin command is issued to see how the phone verifies the file. This would have to be done on an already rooted LG device by someone with the knowledge to do so. I'll see what else I can learn and report back.