So the bootloader unlock exploit has been released today, link to the PDF detailing it here, and the Galaxy S5 on Verizon was bootloader unlocked. The paper describes that any phone with Samsung eMMC is vulnerable to the exploit, so that extends to the Note 3, however it is detailed that only select models can take advantage of the exploit. In short, the exploit is able to overwrite the device identification (CID) that is "permanently" (good job Samsung) written to the eMMC. When the phone is booted, info from the aboot is read that verifies if the CID matches what a "Developer Edition" phone would have and then unlocks the bootloader. There is a couple limitations.
It is questionable whether this will apply to the Note 3, or if it will apply to our variant. My biggest concern is the DE aboot and CID. Our variant doesn't have a Developer Edition, so we may be getting hyped up for nothing. The paper has a link to a github repo that contains the required code to change the CID. Let's hope for the best and hopefully find out if we can do it for our phones.
- A Developer Edition aboot is required.
- We need to be able to flash that aboot with ODIN
- A matching Developer Edition CID to go with that aboot
It is questionable whether this will apply to the Note 3, or if it will apply to our variant. My biggest concern is the DE aboot and CID. Our variant doesn't have a Developer Edition, so we may be getting hyped up for nothing. The paper has a link to a github repo that contains the required code to change the CID. Let's hope for the best and hopefully find out if we can do it for our phones.
Last edited: