As we know, the official way to unlock the bootloader of Zuk Z1 is through fastboot.
For a untouched device, the status of the bootloader should be:
fastboot -i 0x2b4c oem device-info ... (bootloader) Device tampered: false (bootloader) Device unlocked: false (bootloader) Charger screen enabled: false (bootloader) Display panel:
fastboot -i 0x2b4c oem unlock-go
Then the status of the bootloader should be:
fastboot -i 0x2b4c oem device-info ... (bootloader) Device tampered: false (bootloader) Device unlocked: true (bootloader) Charger screen enabled: false (bootloader) Display panel:
It is dangerous! This whole thing is basically one giant hack - which is not intended to be done by normal users. It is messing with the bootloader partition, so it is possible that something goes wrong and you will have a nice & costly brick in your pocket. Be prepared to revive the device from a hard-brick.
Enable 'OEM unlocking' under Developer options. You may need to tap the Build number 7 times under About phone to get the Developer options under Settings.
We need root access (kinda expected!). To root the device without unlocking bootloader, use KingRoot. Use the Android version.
Now there is a catch! KingRoot can root the device, cause the latest build of Cyanogen OS (cm-12.1-YOG4PAS3OH-ham ATM) contains such vulnerabilities which can be exploited by the root exploits used by KingRoot. But we can't ensure about future.
After being rooted, use adb shell or any terminal emulator to dump the 'aboot' i.e bootloader partition in internal sdcard:
su dd if=/dev/block/bootdevice/by-name/aboot of=/sdcard/aboot.img
Now we need to modify the dumped image using hex-editor. For Zuk Z1:
Unlock Bit Position - 0x001FFE10 Hex Tamper Bit Position - 0x001FFE14 Hex
Save the modified image as 'abootmod.img' inside your sdcard.
Now its time to flash back the modded bootloader. Execute the following from adb shell or any terminal emulator:
su dd if=/sdcard/abootmod.img of=/dev/block/bootdevice/by-name/aboot
1. We can also reset the tamper bit using this procedure.
2. If you prefer GUI, then you can use this fantastic app by @wanam.
3. This is tested on an international Zuk Z1 running cm-12.1-YOG4PAS3OH-ham. Please test & post feedback to ensure compatibility.
4. I'm not providing pre-modified images as it increases the risk of bricking the devices having older/newer bootloaders - please do it yourself. The offsets should be unchanged in future, though.
4. @Tengo10 - for risking his device for this experiment.
5. Users of XDA.