• Introducing XDA Computing: Discussion zones for Hardware, Software, and more!    Check it out!

Bootloader Unlocked- Discussion

Search This thread

jbzcar

Senior Member
Jun 8, 2007
259
42
Worked great on my MacBook Pro.

Removed the stupid padlock and boot delay! Running latest AOKP JB nightly. :cowboy:
 
Last edited:

NAU420

Senior Member
Apr 8, 2012
242
29
That's a kexec. It defeats the purpose of unlocked bootloaders

Sent from my Verizon Samsung Galaxy S3 4G LTE

Yes the leankernel is but he has the return to stock kernel in a zip to flash back to stock TW kernel. You should be able to flash that stock kernel after doing the unlock steps. Right?? If so then anyone looking to return to a stock kernel for the unlocking they could use that zip to flash back.
 
Last edited:

Alien-dx11

Senior Member
Aug 23, 2011
138
29
This is absolutely wonderful news. Never thought I'd hear this news. Thanks to all the developers who worked hard to make this possible.
Almost forgot.... FU Verizon.
 

Top Liked Posts

  • There are no posts matching your filters.
  • 16
    How To Unlock:
    Best way to unlock: Play Store app that does it automatically

    Visit Adam's original announcement post:
    http://forum.xda-developers.com/showpost.php?p=30274025&postcount=317

    Huge thanks to everyone in the Research thread spending countless hours to get the job done and the person that made the leak possible!



    Old Info (for reference only!):
    (Text in RED are my safety additions):
    Here's how to do it manually without CASUAL. All credits to Adam.

    From a computer with adb on a rooted device:

    Code:
    adb push aboot.img /sdcard/aboot.img
    
    adb shell
    
    su
    
    dd if=/sdcard/aboot.img of=/dev/block/mmcblk0p5
    Verify you got a good flash:
    Code:
    dd if=/dev/block/mmcblk0p5 of=/sdcard/abootTEST.img
    Now, check the MD5 of abootTEST.img BEFORE you turn your phone off. If it is wrong, reflash again until it is correct. It should be the same as the original aboot.img you already checked the MD5 of.

    Also can be done via downloading the attachment, putting at root of /sdcard/ and doing these commands in terminal on a rooted device:

    Code:
    su
    
    dd if=/sdcard/aboot.img of=/dev/block/mmcblk0p5


    Verify you got a good flash:
    Code:
    dd if=/dev/block/mmcblk0p5 of=/sdcard/abootTEST.img
    Now, check the MD5 of abootTEST.img BEFORE you turn your phone off. If it is wrong, reflash again until it is correct. It should be the same as the original aboot.img you already checked the MD5 of.


    MD5 (aboot.img) = 0ba9ad45fc15cf3d62af7dd363686b3f
    9
    Verizon, when the f*ck will you learn that you will never win? This is such good news!
    6
    Since this is a bootloader image, I'd highly advise everyone to make sure they got a clean download by checking the MD5. It should be:

    A98D7FD72E2FF67341C5E029B5A2E839
    5
    Is anyone else interested in HOW it was cracked? I've been following the thread from the beginning and wished there was a better explanation of what the exploit was
    5

    Mine still says enable as well.

    For those rooted with terminal emulator and who want to do this without linux or a mac here are some quick steps.

    1) Download the original .jar offered in this post.
    2) Extract it and go into SCRIPTS directory
    3) Extract the Flash Secure Aboot.zip
    3) Copy the aboot.img to your phones Sdcard/Download directory
    4) Open Terminal Emulator on your phone, its free to download
    5) Type in: su, at this point it should ask for SuperUser access, allow it.
    6) Type in: dd if=/sdcard/Download/aboot.img of=/dev/block/mmcblk0p5
    7) That's it!

    Kudos to zepfloyd who posted that command on http://www.droid-life.com/2012/08/15/unsecure-bootloader-can-now-be-flashed-to-verizons-galaxy-s3/, I just posted a quick tutorial.