If anyone has questions on what's going on, feel free to ask me. I've been playing around with some ideas with hobbit for a while. Do not try to flash any of the leaked engineering builds including the bootloader from designgears unless you are on MI9, otherwise you will get an auth error for aboot since it's a downgrade. I was able to flash the engineering NON-HLOS.bin to the modem though. The unsigned full build tar has an aboot file that is about 300kb less than all the new ones I compared it too, including the multi-cert full build tar. If we were able to get SDCARD mode working, we could restore MI9 sboot.bin, and flash MI9, then flash test build, and Loki it. I am at work until 4pm central time US but I will try and patch the old aboot this afternoon. I have yet to trip my Knox flag from flashing lots of random stuff. If you do get stuck from flashing any of this stuff after failing from bad signature, flashing your pit alone will fix the problem. I'm going to take a look at that old aboot in hex later too. There has to be some form of failed security logic in this device, I have a feeling.
Also if any of you kernel hackers can use MI9 and were able to modify a kernel module using an old exploit that jeboo is working on, I've got an idea how to spoof the attestation servers Samsung pushes to the devices to verify signatures. It's stored locally in TrustZone also, so if we could get into TrustZone that would be huge. We could even find out if a simple SMC call will fix all our problems (doubtful though.)