And Teracube One A10 is finally certified! Can't wait to get A11 rolling.
Forwarded from Kshitij Gupta
I think I've figured out a fix finally
Kshitij Gupta
Idk how it works but it does now
me everytime i fix a bug
So some context:
You guys probably know a fair bit of this but here it goes anyways:
The R1 is a mt6765 device with a completely unsecure preloader and brom. The brom isn’t easily accessible and in my experience it isn’t too easy to crash preloader and enter brom, even with existing exploits. Maybe I was doing something wrong, but we don’t need it anyways.
The partition layout can be misleading. It appears as if the rabbit team took clean alps and stripped components out of it. The partition layout has vendor_boot and init_boot, which would normally suggest a GKI, but these partitions are blank and unused. They hardly even renamed device identifiers.
The “RabbitOS” system is basically alps with a flutter app set as the launcher, and a service called “Judy” that actively turns off adb. Reversing Judy and RabbitLauncher we find quite a few interesting things.
You guys probably know a fair bit of this but here it goes anyways:
The R1 is a mt6765 device with a completely unsecure preloader and brom. The brom isn’t easily accessible and in my experience it isn’t too easy to crash preloader and enter brom, even with existing exploits. Maybe I was doing something wrong, but we don’t need it anyways.
The partition layout can be misleading. It appears as if the rabbit team took clean alps and stripped components out of it. The partition layout has vendor_boot and init_boot, which would normally suggest a GKI, but these partitions are blank and unused. They hardly even renamed device identifiers.
The “RabbitOS” system is basically alps with a flutter app set as the launcher, and a service called “Judy” that actively turns off adb. Reversing Judy and RabbitLauncher we find quite a few interesting things.
🔥4🤯2😐1
Here’s mtkclient’s printgpt output. We can either use mtkclient directly, or use this output to make a scatter file for SPFT
I didn’t want to do this by hand, so here’s a janky generator:
https://github.com/RabbitHoleEscapeR1/scatter_gen
https://github.com/RabbitHoleEscapeR1/scatter_gen
GitHub
GitHub - RabbitHoleEscapeR1/scatter_gen: A very janky and rough scatter generator that accepts mtkclient printgpt's output
A very janky and rough scatter generator that accepts mtkclient printgpt's output - RabbitHoleEscapeR1/scatter_gen
You can build your own weirdo boot-debug.img by touching a
force_debuggable file in ramdisk, copying adb_debug.prop from AOSP, touching a blank userdebug_plat_sepolicy.cil file in ramdisk. Further, anything added to adb_debug.prop takes precedence, you can mark ro.build.type=eng or userdebug to bypass judy and force enable adb