your risk of bricking in running this exploit is nearly null. Feel free to run it on any firmware version, but newer ones will just say "Password protected, won't work".omg... seems like the ccwgtv is much overall trickier to exploit but has easily realeased an LOS port for this device. Unlucky for me I am really late at this fiasco and I would not be able to find stocks of this manufactured before Dec, 2020 cause I'm in Asia. And I'm still a newbie bout this and I'm afraid can't proceed with this cause this requires executing this with delicate procedures with dumping all these delicate files...
which In me I might easily brick my device, idk should I still upgrade to this from being an Amazon Fire TV 4k unlocked bl use (which is still crap on how limited the FireOS is and not a single custom ROM is released to this device, doesn't have systemwide uvc and USB Dac support or option to route audio into usb without using 3rd party apps) still i love the hard work you hath done... clap clap clap
and If I exploited an exploitable device, can I still install right away Google TV without those OTA's that burn the efuses? or I can just install LOS to not get OTA? Is there a way to block them?
After the exploit you are booted to bootloader and can directly install LineageOS. You don't need to reboot to OS and take the OTA's.
Link me the images for the newer firmware and I'll do itFound another old June 2020 device. Would like to keep this one on stock google android image but block OTA updates so I can try Lineage in the future. I presume the script needs to be updated to use parts of current qts1.210311.036 instead of qts1.210311.008 to prevent the initial activation/setup process from force updating to qts1.210311.036? Anyone try this yet?
Yup. They work fine, so long as they're small enough.