fancypants' experiments
217 subscribers
124 photos
4 videos
37 links
stuff
Download Telegram
And Teracube One A10 is finally certified! Can't wait to get A11 rolling.
Forwarded from Kshitij Gupta
this feels illegal
Forwarded from Kshitij Gupta
Ah the issue was my inclusions
Forwarded from Kshitij Gupta
I think I've figured out a fix finally
Forwarded from Kshitij Gupta
Idk how it works but it does now
🤯1
ah shit, here we go again
👍5🔥1😁1
hello
🔥1
😳😳😳
i've gotten better at commit messages
🫡10
hello yall how have u been im back
4👌4
some rabbit r1 rants coming up, until then:
🔥3🤩2
oh no cringe
🤨5😢2🐳1
So some context:
You guys probably know a fair bit of this but here it goes anyways:
The R1 is a mt6765 device with a completely unsecure preloader and brom. The brom isn’t easily accessible and in my experience it isn’t too easy to crash preloader and enter brom, even with existing exploits. Maybe I was doing something wrong, but we don’t need it anyways.

The partition layout can be misleading. It appears as if the rabbit team took clean alps and stripped components out of it. The partition layout has vendor_boot and init_boot, which would normally suggest a GKI, but these partitions are blank and unused. They hardly even renamed device identifiers.

The “RabbitOS” system is basically alps with a flutter app set as the launcher, and a service called “Judy” that actively turns off adb. Reversing Judy and RabbitLauncher we find quite a few interesting things.
🔥4🤯2😐1
Here’s mtkclient’s printgpt output. We can either use mtkclient directly, or use this output to make a scatter file for SPFT
Next let’s talk about Judy.
🫡2
I think that's self explanatory.
You can build your own weirdo boot-debug.img by touching a force_debuggable file in ramdisk, copying adb_debug.prop from AOSP, touching a blank userdebug_plat_sepolicy.cil file in ramdisk. Further, anything added to adb_debug.prop takes precedence, you can mark ro.build.type=eng or userdebug to bypass judy and force enable adb