[ot][spam] log: trying to take control of my free government phone
Undiscussed Horrific Abuse, One Victim of Many
gmkarl at gmail.com
Tue Jul 19 14:18:02 PDT 2022
unfortunately i don't presently have access to my kernel sources to
try any mtk exploits that come with mtkclient. mediatek wrote a linux
kernel driver that engages the boot loader, and mtkclient patches it.
i'm on a redhat enterprise linux system that has expired.
mtkclient]$ python3 mtk gettargetconfig
Preloader - CPU: MT6739/MT6731()
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10212000
Preloader - Var1: 0xb4
Preloader - Disabling Watchdog...
Preloader - HW code: 0x699
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xcb00
Preloader - SW Ver: 0x2
Main - Getting target info...
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
More information about the cypherpunks
mailing list