so do i just wait a couple of days to see if they make one?
so do i just wait a couple of days to see if they make one?
I'm currently unlocked. Did it on my Mac....now we just need non kexec kernels!
I'd look in the bounty thread. I think the info of who gets the bounty will be posted in there.
Can't you use the stock TW kernel download flash zip from the leankernel thread on Rootzwiki website?
Worked great on my MacBook Pro.
Removed the stupid padlock and boot delay! Running latest AOKP B nightly.![]()
That's a kexec. It defeats the purpose of unlocked bootloaders
Sent from my Verizon Samsung Galaxy S3 4G LTE
Can i just restore my first nandroid which is stock, and run this root
so does anyone know if we have to be 100% stock or can we just do it from whatever current ROM we are running
someone leaked unsecure bootloaderIs anyone else interested in HOW it was cracked? I've been following the thread from the beginning and wished there was a better explanation of what the exploit was
Here's how to do it manually without CASUAL. All credits to Adam.
From a computer with adb on a rooted device:
Verify you got a good flash:Code:adb push aboot.img /sdcard/aboot.img adb shell su dd if=/sdcard/aboot.img of=/dev/block/mmcblk0p5
Now, check the MD5 of abootTEST.img BEFORE you turn your phone off. If it is wrong, reflash again until it is correct. It should be the same as the original aboot.img you already checked the MD5 of.Code:dd if=/dev/block/mmcblk0p5 of=/sdcard/abootTEST.img
Also can be done via downloading the attachment, putting at root of /sdcard/ and doing these commands in terminal on a rooted device:
Code:su dd if=/sdcard/aboot.img of=/dev/block/mmcblk0p5
Verify you got a good flash:
Now, check the MD5 of abootTEST.img BEFORE you turn your phone off. If it is wrong, reflash again until it is correct. It should be the same as the original aboot.img you already checked the MD5 of.Code:dd if=/dev/block/mmcblk0p5 of=/sdcard/abootTEST.img
MD5 (aboot.img) = 0ba9ad45fc15cf3d62af7dd363686b3f