A few things on knox / rooting and bootloaders that need more testing / development

Search This thread

david515

Member
May 18, 2013
26
14
Ames
I'm still

FYI google has the cached version before it was mod editted and all the stuff is still in his google drive account available for download.
I'm thinking factory mode is without any protection. gives us full freedom to do with almost anything without security? Just thinking.

---------- Post added at 10:24 AM ---------- Previous post was at 10:14 AM ----------

This is encouraging check this post -- Evilpotatomans post http://xdaforums.com/showthread.php?t=2721505
I hope this helps you guys out.
Thank you!!
That sucks it was yanked.
 

ryanbg

Inactive Recognized Developer
Jan 3, 2008
858
1,739
movr0.com
WARNING:
This is very dangerous. I have been able to reproduce and recover every time, but there is a HUGE inherent risk of permabricking. I am able to manually put my device into QHSUSB_BULK mode by overwriting SDI/DBI with SBL1. The screen will go black immediately, and your device will be recognized as a QHSUSB_BULK device. You can recover by making a 256MB (arbitrary number, has to be over like 128MB) unbrick image. This can be made by pulling the first 256MB from mmcblk0. Then flash to SD card using DD or Win32DiskImager. Do this before flashing SBL1 to DBI/SDI. Pop it in and it should boot right back normally, so ODIN and flash SDI again to fix. This can be useful for various purposes, of which the right people are already aware.
 
Last edited:

RaluSiCris

Senior Member
Aug 7, 2011
160
25
WARNING:
This is very dangerous. I have been able to reproduce and recover every time, but there is a HUGE inherent risk of permabricking. I am able to manually put my device into QHSUSB_BULK mode by overwriting SDI/DBI with SBL1. The screen will go black immediately, and your device will be recognized as a QHSUSB_BULK device. You can recover by making a 256MB (arbitrary number, has to be over like 128MB) unbrick image. This can be made by pulling the first 256MB from mmcblk0. Then flash to SD card using DD or Win32DiskImager. Pop it in and it should boot right back normally, so ODIN and flash SDI again to fix. This can be useful for various purposes, of which the right people are already aware.

it can be made a how to in order to be useful for all of us? It would be really appreciated.
Thanks

Sent from my SM-N9005 using xda app-developers app
 

E:V:A

Inactive Recognized Developer
Dec 6, 2011
1,447
2,222
-∇ϕ
I just got a long shot theory, that need investigation.

It could work for Qualcomm based QFUSE Knox'ing.

The idea is this:

When QFUSE is written, it has to go through a special high-current/voltage power rail, triggered by the qfuse code (we already have). What we can do is to prevent enough power to reach the chip the qfuse is located on, by either on-the-fly patching the qfuse code, or by putting a resistive load, detected and timed exactly when this write happens. This would hopefully cause the QFPROM write to fail within a few attempts or timeout. It should be easily constructed by using standard tools like BusPirate, Arduino or RasberryPi. In the best case scenario, we might just have to solder a resistor somewhere. In the worst, the qfuse code goes into an infinite loop, completely blocking the device.

Please look at the code to determine feasibility for this HW hack.
 

Product F(RED)

Senior Member
Sep 6, 2010
9,883
2,105
Brooklyn, NY
I just got a long shot theory, that need investigation.

It could work for Qualcomm based QFUSE Knox'ing.

The idea is this:

When QFUSE is written, it has to go through a special high-current/voltage power rail, triggered by the qfuse code (we already have). What we can do is to prevent enough power to reach the chip the qfuse is located on, by either on-the-fly patching the qfuse code, or by putting a resistive load, detected and timed exactly when this write happens. This would hopefully cause the QFPROM write to fail within a few attempts or timeout. It should be easily constructed by using standard tools like BusPirate, Arduino or RasberryPi. In the best case scenario, we might just have to solder a resistor somewhere. In the worst, the qfuse code goes into an infinite loop, completely blocking the device.

Please look at the code to determine feasibility for this HW hack.

Very good way of looking at it. Proactive instead of reactive; forget trying to reset the eFuses (which is impossible), and prevent them from being tripped/blown to begin with. :good:
 

david515

Member
May 18, 2013
26
14
Ames
Very good way of looking at it. Proactive instead of reactive; forget trying to reset the eFuses (which is impossible), and prevent them from being tripped/blown to begin with. :good:

At first I was think there might be a way of a bypass but I am lost on this and realize this whole bootloader is way more complex then I once thought, and on other thoughts someone very well could custom write and custom designed a whole bootloader and that would be the fix to this dilemma.I don't have all the knowledge or time to do such a feat.

@Eva I think your Idea is good and worth looking into for sure.Thanks for your help.

I am burned out on this Knox bootloader at this point. I'm going to sell my retail SM-N900V and get a different carrier different gn3 phone that isn't locked
maybe tmobile.
 
Last edited:

Product F(RED)

Senior Member
Sep 6, 2010
9,883
2,105
Brooklyn, NY
At first I was think there might be a way of a bypass but I am lost on this and realize this whole bootloader is way more complex then I once thought, and on other thoughts someone very well could custom write and custom designed a whole bootloader and that would be the fix to this dilemma.I don't have all the knowledge or time to do such a feat.

@Eva I think your Idea is good and worth looking into for sure.Thanks for your help.

I am burned out on this Knox bootloader at this point. I'm going to sell my retail SM-N900V and get a different carrier different gn3 phone that isn't locked
maybe tmobile.

If you're not on Verizon (as in you're currently using a Verizon model on a different carrier), the T-Mobile version is your only option as far as unlocked bootloaders go (for GSM). You could get the Sprint model and hack-unlock it for domestic GSM (it blocks US SIM cards even when unlocked by default). Or you could get the SM-900V Dev Edition which is rare and expensive. I recommend the T-Mobile model. I have it and it's the easiest to deal with.

Sent from my SM-N900T using Tapatalk
 
  • Like
Reactions: david515

E:V:A

Inactive Recognized Developer
Dec 6, 2011
1,447
2,222
-∇ϕ
Looong shot number two. (Qualcomm)

This is regarding a quasi-SW hack.

I think it would be extremely useful if someone could start charting out the exact chain of events, leading up to a qfuse write. I'd like to see a chart, kind of what we had for the SecureBoot2 stuff in the 8960... But I'm totally not up-to-date on the current Knox research status, so perhaps this has been done already?

Anyway, the idea is as follows. If at any point the Knox detection mechanism is using code from the modem Hexagon processor, I can almost bet my behind that there could be a hidden proprietary function in the Modem code, that could disable Knox flag. Knowing Qualcomm has their 80 MB blobs of Hexagon RTOS code, this would be some crazy feat to accomplish, but certainly not impossible. (Most of it is redundant anyway, often having ~3 copies of modem binaries, for example.) So if this is possible, I would assume there could be some hidden AT commands accessible from modem terminal shell that temporarily disables Knox fuse.

Where to look? We would need to reverse all the AT command functions using IDA Pro and the Hexagon plugins, and look for code that is related to Qfuse burning. (There is probably a lot of this code, since the recent discovery show that many RF variables are now also using qfuses.) That's why we need to make the chart above...

But given the low RoE (Return of Effort), I actually do not recommend spending too much time on this, unless Knox is starting to cause real trouble to people.
 

Surge1223

Recognized Contributor
Nov 6, 2012
2,622
7,466
Florida
Google Pixel 6 Pro
Looong shot number two. (Qualcomm)

This is regarding a quasi-SW hack.

I think it would be extremely useful if someone could start charting out the exact chain of events, leading up to a qfuse write. I'd like to see a chart, kind of what we had for the SecureBoot2 stuff in the 8960... But I'm totally not up-to-date on the current Knox research status, so perhaps this has been done already?

Anyway, the idea is as follows. If at any point the Knox detection mechanism is using code from the modem Hexagon processor, I can almost bet my behind that there could be a hidden proprietary function in the Modem code, that could disable Knox flag. Knowing Qualcomm has their 80 MB blobs of Hexagon RTOS code, this would be some crazy feat to accomplish, but certainly not impossible. (Most of it is redundant anyway, often having ~3 copies of modem binaries, for example.) So if this is possible, I would assume there could be some hidden AT commands accessible from modem terminal shell that temporarily disables Knox fuse.

Where to look? We would need to reverse all the AT command functions using IDA Pro and the Hexagon plugins, and look for code that is related to Qfuse burning. (There is probably a lot of this code, since the recent discovery show that many RF variables are now also using qfuses.) That's why we need to make the chart above...

But given the low RoE (Return of Effort), I actually do not recommend spending too much time on this, unless Knox is starting to cause real trouble to people.

I looked into the command to set the knox flag/fuse/warranty bit and the underlying function. And you may be right about hexagon since hlos has the strings in it that say "device is tampered!" etc...and a secure monitor call to set the warranty void flag goes to an address in tz memory. I think itd take a while to figure out the who, what, where, just by examining assembly without a kernel, TrustZone, or hexagom vulnerability...plus its a mix of arm/thumb/random blobs.

Sent from my SCH-I545 using XDA Premium 4 mobile app
 

david515

Member
May 18, 2013
26
14
Ames
I found this and wondered if this may hlp

I looked into the command to set the knox flag/fuse/warranty bit and the underlying function. And you may be right about hexagon since hlos has the strings in it that say "device is tampered!" etc...and a secure monitor call to set the warranty void flag goes to an address in tz memory. I think itd take a while to figure out the who, what, where, just by examining assembly without a kernel, TrustZone, or hexagom vulnerability...plus its a mix of arm/thumb/random blobs.

Sent from my SCH-I545 using XDA Premium 4 mobile app


I found this link on a knox reset .I don't know if this is reliable as of yet? but interesting if it is for real.
http://sxtpdevelopers.com/samsung-note-3-knox-fix-qualcomm/
 

ruchirtrehan

Senior Member
Aug 1, 2013
726
1,250
Gurgaon
(Knox had been triggered on the the tested device already), This has been tested & working on Note 3 N900/Exynos on KitKat ND1 firmware which was on official status without root but Knox triggered, The file was flashed using Odin and after flashing I went into download mode and to my surprise Knox was been reset from 0x1 to 0 but the device status had turned custom (was official before flashing the Knox reset), however I will re-flash the firmware and see if Knox remains 0 and device status turns to official, also there are some different stuff in download mode which I hadn't ever seen before like EMMC PIN, Binary Sboot Version and all. I'll be attaching the screenshots for the same kindly find in attachments.

Edit/Update 1 : After re-flashing the firmware stuff like EMMC PIN and Binary Sboot Version has disappeared Current Binary has turned to official and the Knox has remained to 0 however System Status still appears to be Custom...

Edit/Update 2 : (Refers to previous updates regarding System Status being Custom and not turning to Official.) After trying to flash the firmware several times nothing really worked (nothing to do with Knox and Current Binary only referred to System Status being Custom) hence I went to stock recovery and wiped Data/Factory Reset and Cache Partition and then re-flashed the firmware (ND1 KitKat) and VOILA! Binary/System Status are now Official and now Knox is 0, seems a great success for the Exynos users, I also do have an snapdragon version so will be looking forward to it, screenshots attached....

Edit/Update 3 : The steps for resetting Knox (Exynos Note 3 ONLY!) :

1 - Download the bootloader.zip and extract bootloader from it (find in attachments)

2 - Open Odin and put device in download mode.

3 - Select AP/PDA (depending on Odin version you have) and select the bootloader (which was downloaded during step 1) don't select any other option in odin except F reset time and auto reboot (are selected by default).

4 - After the file is flashed go to download mode and check if the Knox has turned back to 0.

5 - Flash official firmware from sammobile and after flashing is done let the device reboot and boot up to device set-up screen, don't proceed the set-up for setting up device and turn of it off.

6 - Reboot to stock recovery (power + vol up + home) and wipe data/cache and flash the firmware again, once flashing the firmware is completed enter download mode and check if current binary and system status has turned to official if not follow steps number 5 and 6 again.

And that's pretty much it ;), you have successfully been able to reset Knox and regain warranty by this.

PS : I had done all this steps on ND1 firmware, and this will not keep root access, to root Knox has to be tripped or keep Knox 0 but Current Binary or System Status will be custom wit Knox being 0. Also to note this might get (patched) in future updates (bootloaders) if we look at Samsung's history of patching stuff :p, though not sure about it...

This will not work on any variant other than Exynos (Note 3) due to different processors and the boot system of both Exynos and Snapdragon. (the bootloader for (Exynos) contains Sboot which is only for the Exynos variant which cannot be used on Snapdragon as it uses Aboot). So this is by no way meant to work on SD variant or any other Samsung device ie S5/S4/Note 2 etc. and hence requested NOT TO USE IT on any other model than Exynos Note 3.

Edit/Update 4 : Downgrading Note 3 N900/N9000/Exynos from 4.4.2 to 4,3 has been successful, check out this post by me to be updated on steps regarding the same.

I'll be testing some work around's for the N9005 (Snapdragon) to reset Knox/Firmware Downgrade once I get that device as I have given mine to a friend, and have been saving money to buy a new or used N9005.
 

Attachments

  • IMG_20140501_131551.jpg
    IMG_20140501_131551.jpg
    250.1 KB · Views: 15,385
  • IMG_20140501_131553.jpg
    IMG_20140501_131553.jpg
    249.2 KB · Views: 14,626
  • IMG_20140501_140421.jpg
    IMG_20140501_140421.jpg
    248.2 KB · Views: 14,525
  • Bootloader.zip
    1.4 MB · Views: 23,397
Last edited:

xclub_101

Senior Member
Oct 15, 2012
1,252
358
Samsung Galaxy S23 Ultra
...
This will not work on any variant other than Exynos (Note 3) due to different processors and the boot system of both Exynos and Snapdragon. (the file for resetting Knox (Exynos) contains Sboot which is only for the Exynos variant which cannot be used on Snapdragon as it uses Aboot). So this is by no way meant to work on SD variant or any other Samsung device ie S5/S4/Note 2 etc. and hence requested NOT TO USE IT on any other model than Exynos Note 3.

Quick question to have a more complete view on where things are - I do not have the N900 and I know little about it so the question might already not be a problem there but it certainly is on N9005 - can you also downgrade the firmware after you write the knox-reset piece?
 
  • Like
Reactions: ruchirtrehan

ruchirtrehan

Senior Member
Aug 1, 2013
726
1,250
Gurgaon
Quick question to have a more complete view on where things are - I do not have the N900 and I know little about it so the question might already not be a problem there but it certainly is on N9005 - can you also downgrade the firmware after you write the knox-reset piece?

That's a pretty interesting question, I hadn't really thought about it but I guess to give it a shot pretty soon, I am out of town atm so will try and do it asap and let you know if it could be possible to do so..
 

haybill

Senior Member
Apr 13, 2012
2,022
780
Somewhere in Europe
Hello @RuchRha--I saw you on another thread and tracked you down to this one--it has been reported that flashing Root using CF-Root, to a Canadian N900W8, was possible to do without compromising KNOX warranty counter-- do you know whether the same applies to SM N900 variant?

Apologies if this has been asked./answered but couldn't find reference to the answer.
 

smeet.somaiya

Senior Member
Jan 24, 2014
1,305
590
Mumbai
That's a pretty interesting question, I hadn't really thought about it but I guess to give it a shot pretty soon, I am out of town atm so will try and do it asap and let you know if it could be possible to do so..

Attempting to downgrade is worth trying. If it succeeds it would be great. If it fails with "Firmware Upgrade encountered issue" no worries just flash stock recovery back and the phone would be up again.

Sent from my Galaxy S5 GT-N7100
 

Top Liked Posts

  • There are no posts matching your filters.
  • 102
    (Knox had been triggered on the the tested device already), This has been tested & working on Note 3 N900/Exynos on KitKat ND1 firmware which was on official status without root but Knox triggered, The file was flashed using Odin and after flashing I went into download mode and to my surprise Knox was been reset from 0x1 to 0 but the device status had turned custom (was official before flashing the Knox reset), however I will re-flash the firmware and see if Knox remains 0 and device status turns to official, also there are some different stuff in download mode which I hadn't ever seen before like EMMC PIN, Binary Sboot Version and all. I'll be attaching the screenshots for the same kindly find in attachments.

    Edit/Update 1 : After re-flashing the firmware stuff like EMMC PIN and Binary Sboot Version has disappeared Current Binary has turned to official and the Knox has remained to 0 however System Status still appears to be Custom...

    Edit/Update 2 : (Refers to previous updates regarding System Status being Custom and not turning to Official.) After trying to flash the firmware several times nothing really worked (nothing to do with Knox and Current Binary only referred to System Status being Custom) hence I went to stock recovery and wiped Data/Factory Reset and Cache Partition and then re-flashed the firmware (ND1 KitKat) and VOILA! Binary/System Status are now Official and now Knox is 0, seems a great success for the Exynos users, I also do have an snapdragon version so will be looking forward to it, screenshots attached....

    Edit/Update 3 : The steps for resetting Knox (Exynos Note 3 ONLY!) :

    1 - Download the bootloader.zip and extract bootloader from it (find in attachments)

    2 - Open Odin and put device in download mode.

    3 - Select AP/PDA (depending on Odin version you have) and select the bootloader (which was downloaded during step 1) don't select any other option in odin except F reset time and auto reboot (are selected by default).

    4 - After the file is flashed go to download mode and check if the Knox has turned back to 0.

    5 - Flash official firmware from sammobile and after flashing is done let the device reboot and boot up to device set-up screen, don't proceed the set-up for setting up device and turn of it off.

    6 - Reboot to stock recovery (power + vol up + home) and wipe data/cache and flash the firmware again, once flashing the firmware is completed enter download mode and check if current binary and system status has turned to official if not follow steps number 5 and 6 again.

    And that's pretty much it ;), you have successfully been able to reset Knox and regain warranty by this.

    PS : I had done all this steps on ND1 firmware, and this will not keep root access, to root Knox has to be tripped or keep Knox 0 but Current Binary or System Status will be custom wit Knox being 0. Also to note this might get (patched) in future updates (bootloaders) if we look at Samsung's history of patching stuff :p, though not sure about it...

    This will not work on any variant other than Exynos (Note 3) due to different processors and the boot system of both Exynos and Snapdragon. (the bootloader for (Exynos) contains Sboot which is only for the Exynos variant which cannot be used on Snapdragon as it uses Aboot). So this is by no way meant to work on SD variant or any other Samsung device ie S5/S4/Note 2 etc. and hence requested NOT TO USE IT on any other model than Exynos Note 3.

    Edit/Update 4 : Downgrading Note 3 N900/N9000/Exynos from 4.4.2 to 4,3 has been successful, check out this post by me to be updated on steps regarding the same.

    I'll be testing some work around's for the N9005 (Snapdragon) to reset Knox/Firmware Downgrade once I get that device as I have given mine to a friend, and have been saving money to buy a new or used N9005.
    28
    WARNING:
    This is very dangerous. I have been able to reproduce and recover every time, but there is a HUGE inherent risk of permabricking. I am able to manually put my device into QHSUSB_BULK mode by overwriting SDI/DBI with SBL1. The screen will go black immediately, and your device will be recognized as a QHSUSB_BULK device. You can recover by making a 256MB (arbitrary number, has to be over like 128MB) unbrick image. This can be made by pulling the first 256MB from mmcblk0. Then flash to SD card using DD or Win32DiskImager. Do this before flashing SBL1 to DBI/SDI. Pop it in and it should boot right back normally, so ODIN and flash SDI again to fix. This can be useful for various purposes, of which the right people are already aware.
    26
    Quick question to have a more complete view on where things are - I do not have the N900 and I know little about it so the question might already not be a problem there but it certainly is on N9005 - can you also downgrade the firmware after you write the knox-reset piece?

    I'll test it!

    Edit/Update 1 : Wowzer guys, I have some good news for you all, I have been successfully able to downgrade from 4.4.2 to 4.3 without any issues, The firmware I downgraded to is MI3 and Knox is not present in download mode will post steps soon and guide you through steps for a safe downgrade, PS : this is only for SM-N900/N9000/Exynos for now, screenshots attached..

    Edit/Update 2 : Steps to Downgrade (Note 3 Exynos only!)

    1 - Download the bootloader.zip and extract then flash in Odin. (Find in attachments) (don't select any other option in odin except F reset time and auto reboot) (are selected by default).

    2 - Download any 4.3 JellyBean Firmware from sammobile.

    3 - After flashing the bootlaoder reboot into stock recovery (power+ home+ vol up) and wipe data/factory reset and cache partition

    4 - Turn off the device and reboot into download mode and flash the 4.3 Firmware in Odin.

    5 - After flashing completed let the device boot till boot screen and pull out the battery and turn it off then turn it on again and reboot into recovery (power+ home+ vol up) and wipe data/factory reset and cache partition once again and reboot and let the device boot up.

    That's pretty much it, you've safely downgraded to Android 4.3 from 4.4

    This is only for Note 3 Exynos!

    I'll be testing some work around's for the N9005 (Snapdragon) to reset Knox/Firmware Downgrade once I get that device as I have given mine to a friend, and have been saving money to buy a new or used N9005.
    25
    I never had the time (and the devices) to properly research this but there are a few things that other people might want to test (or already know the answers) and I think it might come very handy to the Note 3 community. There is a somehow similar thread for the S4 community here.




    0) SUCCESS WITH KNOX / DOWNGRADING ON N900 !!!

    On N900 (Exynos) there is now a solution (unfortunately for the moment only for Exynos models) - a special firmware leaked originally here:

    http://sxtpdevelopers.com/samsung-note-3-knox-fix-qualcomm/

    (it looks like a firmware reset/update for the EMMC, which results in the erase of the RPMB where Knox flag and downgrade restrictions are stored).

    In this thread details on some of the people testing it can be found in those posts:

    http://xdaforums.com/showthread.php?p=52329946#post52329946

    http://xdaforums.com/showthread.php?p=52408318#post52408318

    If the original site is taken down by Samsung you need to search after a file called BL_HA3GZS_CLEAR_WARRANTY_BIT.tar - the one I saw was 2334801 bytes in length (might be shown as a 2.23MB download in some chinese sites). There might be a problem finding it since Samsung might go after anybody hosting and distributing it.


    1) Just rooting should not trip knox

    The problem with rooting that makes knox 0x1 - originally Root De La Vega was developed for the AT&T very locked structure, and as such it was doing the rooting in a pretty convoluted way. However on other Note 3 versions the knox warranty flag is very clearly linked to just kernel and recovery, and not to system itself. In other words it SHOULD be possible (even after MJ3) to root and keep knox 0x0 on devices that are not "bootloader locked" by not touching kernel and recovery and only touching system - that is probably NOT going to work on AT&T (N900A) but it seems to work on N900W8 and IMHO it could also work on N9005 (and possibly N9000, but I know much less about that). If you want more proof look into the posts about N900W8 + different version (of more or less) stock-based ROMs (like xnote, but stock kernel and recovery).

    So the bottom line on this is to verify on a knox 0x0 device with firmware MJ3 (or newer) that just writing a pre-rooted system would be allowed in download mode and would keep knox 0x0. And we would need a more clear confirmation for both N900W8 and N9005 (or any other models) - of course with some description of what was written and how ;)

    EDIT: some W8 users have provided extra details and so far it looks it might be more the bootloader itself and not so much in how/what is written, but more information is needed.
    EDIT2: there is a thread with that kind of talk here:
    http://xdaforums.com/showthread.php?t=2627996



    2) We should really test the "portability" of various bootloaders since this could solve a lot of things

    First - here are two external (non-xda) pages with some very good development information regarding "bootloader hacking":

    http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html

    http://blog.azimuthsecurity.com/2013/05/exploiting-samsung-galaxy-s4-secure-boot.html

    On bootloader-confused devices (for instance Hong-Kong versions that got the KitKat bootloader from Polish/XEO KK and have to wait for Hong-Kong KitKat, or any device that seems to be bricked in the bootloader) it might be also interesting (for somebody VERY daring - remember that it could brick your phone even worse) to try to write the bootloader files (all 5 of them?) from the N900W8 and see if those are accepted (since once that would be the case downgrading would also become a possibility).

    EDIT: the N900W8 is also reported (see here) to let you have a custom recovery and not trip knox, which is kind of weird but maybe this is the knox breakthrough that we were expecting :)



    3) More info on STRAP flags (those listed in download mode)

    STRAP flags - there are a number of places where the values listed in download mode are discussed, for instance:

    http://xdaforums.com/showthread.php?t=2567165

    It seems that the values for S T R A and P flags could be versions of the 5 main bootloader-related files used in Qualcomm-based Note 3 devices, most likely:

    S - SBL1

    T - TZ

    R - RPM

    A - ABOOT

    P - SDI (?)


    My EU N9005 (I believe with MI7 or so bootloader) was something like S1, T1, R1, A1, P1 and also SECUREBOOT: ENABLE (CSB) (as it can be seen in the thread above) but is now P2 (which is very strange since I had all automatic and security updates disabled, but might be related to the fact that at some point I activated the reactivation flag linked to the Samsung account - disabling it does not return P back to 1 so this might not be it).

    Also if you look around the values seem to be somehow consistent - with post-MJ3 bootloader most flags become 2 and with KitKat bootloader at least the A flag becomes 3.

    It remains to be seen if this is the case and if it is any way relevant to hacking the bootloader system or knox (or is just for debug purposes - like when we see people with A3 complaining that they can't return to stock MJ7 or MK2).


    4) More info on "microSD debricking and if this could let us re-write different bootloader files (and maybe we should encourage people to have their "debricking image" made in advance "just in case")

    When the bootloader files become "bad" and you can not go in download mode (but probably sbl1 is still valid) it is still possible to recover things by forcing the boot process from microSD. That seems to require no extra hardware on Qualcomm models and one small contact for Exynos devices (where that is even documented in Samsung original documents like 13-58_SM-N900_Boot_Recovery_Guide_rev1.0.pdf).

    There is a thread on this at:

    http://xdaforums.com/showthread.php?t=2625332



    5) More info on how Samsung CAN reset knox

    There are already two threads with something more than 5-6 first-hand reports from people that went with a Note 3 knox 0x1 into service and left with the same device (and motherboard and IMEI and in some cases all their programs and even their normal/old firmware) but with knox 0x0!

    One thread in T-Mobile Note 3 forum:

    http://xdaforums.com/showthread.php?t=2637718

    And a much larger one in International Note 3 forum:

    http://xdaforums.com/showthread.php?t=2504258

    There is also already a "hardware+software solution" (expensive, aimed at specialized phone shops that also do phone unlocking and similar stuff) which claims to be able to reset the knox flag on Exynos devices:

    http://forum.gsmhosting.com/vbb/f67...olution-solution-repair-rebuild-emmc-1769456/
    http://forum.gsmhosting.com/vbb/f67...bit-0-solution-inside-first-ih-world-1776265/
    http://forum.gsmhosting.com/vbb/f672/regarding-knox-s4-1775213/




    6) Pre-production bootloaders before knox?

    Here is an interesting thread apparently about a N9005 with no knox:

    http://xdaforums.com/showthread.php?t=2657631
    23
    it can be made a how to in order to be useful for all of us? It would be really appreciated.
    Thanks

    Sent from my SM-N9005 using xda app-developers app

    If you don't know how it can be useful, this is probably not the best place for you to be posting.