RodinHub | Updates | Releases
204 subscribers
38 photos
9 videos
2 files
20 links
Poco X7 Pro | Redmi Turbo 4 | Announcements/Updates
Download Telegram
Right now, HyperOS 3 is in Internal testing.
πŸ†™ LineageOS 22.2 - UNOFFICIAL
#ROM #A15 #V #Rodin #LineageOS #LOS

πŸ“± Device: Poco X7 Pro (rodin)
πŸ‘€ Developer: @rthedream
ℹ️ Android Version: Android 16
πŸ“† Build date: 6/09/2025
πŸ“‚ File Size: 1,9GB

Flashing steps: click me!

⬇️ Download Rom : Gofile | Mirror | Vendor Boot

πŸ–Ό Screenshoot : Click here

πŸ—’ Changelogs:
- Tune-out the powerhint
- Downscale task snapshots into 70%
- Offload WM shell to another thread
- Disable alpha compositing in WM
- Disable GED KPI
- Resolve SoFOD (goodix displays)
- Initial release


❗️Known issues:
- Audio jumpscares while playing media first time
- SoFOD (done)
- HTSR
- FOD on jiiov sensors (done)
πŸ“ Notes:
- SELinux is enforcing.
- Vanilla build, use mindthegapps/nikgapps to use GApps
- Signed build
- Make sure u've backup IMEI.
🀝 Thanks to:
- @claxten, @rio113 for help
- @MrZ3T4, @Tutup_oli, @Saiful220, @julesovalle for tester
- @rthedream for device tree
β˜•οΈ Buy the dev a coffee.
- Ko-fi
- Dana
- Saweria

- Channel : @rodinupdate
- Discussion : @rodincommunity
πŸ”₯4
Forwarded from Roxy Team
Media is too big
VIEW IN TELEGRAM
New Port!?

Poco X7 Pro with Oxygen OS

Clips By @Naka_Haru_rs
Edit By @Naka_Haru_rs
Music: Analog Horror Funk
❀6
πŸ†™ PixelOS Fifteen - UNOFFICIAL
#ROM #A15 #V #Rodin #PixelOS #POS

πŸ“± Device: Poco X7 Pro (rodin)
πŸ‘€ Developer: @rthedream
ℹ️ Android Version: Android 15
πŸ“† Build date: 8/09/2025
πŸ“‚ File Size: 2,8GB


🚨Flashing steps: click me!
⬇️ Download Rom : Sourceforge | Telegram | Vendor Boot
πŸ–Ό Screenshoot : Click here
πŸ—’ Changelogs: click me

❗️Known issues:
β€’ Audio jumpscares while playing media first time
β€’ HTSR

πŸ“ Notes:
β€’ SELinux is enforcing.
β€’ GApps build
β€’ Signed build
β€’ OTA implemented
β€’ Make sure u've backup IMEI.
🀝 Thanks to:
β€’ @claxten, @rio113 for help
β€’ @MrZ3T4, @Tutup_oli, @Saiful220, @julesovalle for tester
β€’ @rthedream for device tree
β˜•οΈ Buy me a coffee!
β€’  Ko-fi
β€’  Dana
β€’  Saweria
- Channel : @PocoX7ProID
- Discussion : @PocoX7ProIDChat
πŸ”₯5
NOOO MY DAUGHTER NOOOO
😭3🀣1
NessOS

Based on secret rom :3

Added 90hz
Lower resolution option
Fullscreen AOD
Screenshot Device Frame
Small Tweaks
Better camera and perf and battery because of the rom it's based on(secret)
❀4πŸ”₯3πŸ‘1πŸ‘Ž1
AxionAOSP need testing reply here in message need active one and can grab logs properly if there's problem on it need at 2.0.101.0VOJMIXM
Dictionary

Ports=gay
Hyper=gay
Google=gay
Ximi=gay
paywall=gay
Gatekeep=gay
Rafi=gay
Akshontol=gay
AI=gay
Always read the full thing.



Many of you have seen this XDA tread and thought, "oh no, there is no rollback in Xiaomi.eu or even Xiaomi!" That's not the case. This is the initial test of xiaomi.eu for our phone when they didn't know there was a region lock, the flashed rom was based on CN, thus resulted in brick.

Xioami.eu removed it from Patreon afterwards but added it back with two different roms for global and CN separately to fix this.
❀1
Forwarded from Roxy Team
Media is too big
VIEW IN TELEGRAM
Best BBK Port?

Poco X7 Pro with Color OS!

Clips by: @Naka_Haru_rs
Edit by: @Naka_Haru_rs
Music: MONTAGEM SILICONADE - Slowed
πŸ”₯2
IMPORTANT WARNING ATTENTION
A leak targeting users has been detected in the GetApps application, which is a system application in the HyperOS and MIUI systems on Xiaomi, Redmi, and Poco devices. As a result of this leak, two types of software, Malware and Adware, were detected, including the GetApps application. These software programs, which run in the background and suddenly pop up full-screen ads, and also steal personal data in the background, were specifically detected in the β€œWifiWarden” application, which is automatically installed for users. If this application is installed on your device, I would like to point out that you are at risk; everything from your photos to your bank details could be stolen. My personal recommendation is to completely uninstall this application and the GetApps application if they are installed. Wishing you a good day.
Nothing Phone 2a Bootloader Exploit Working

A new exploit called Fenrir targets the Nothing Phone 2a, CMF Phone 1 & other MediaTek-powered devices. It takes advantage of a flaw in how the phone starts up, allowing full control over the device before Android even loads. Even after waiting for 1 month, Nothing ignored the developer's bootloader vulnerability report affecting CMF Phone 1 and Phone 2a and thus developer made it exploit public.

When you power on your phone, it goes through several steps to make sure everything is secure and untampered. This is called the secure boot chain. Each of these steps is trusted only if the previous one verifies it.

1. BootROM – The first code built into the chip. It loads the next part.
2. Preloader – Loads the next component, called bl2_ext, and normally checks it.
3. bl2_ext – This runs at the highest privilege level (EL3) and is supposed to check everything else.
4. TEE (Trusted Execution Environment) – Handles secure operations like fingerprint data and encryption.
5. GenieZone – A MediaTek component that manages access to the secure system.
6. LK / AEE – Boots the Android operating system and handles crash logging.
7. Linux Kernel – This is Android. The phone is now fully booted.

This exploit abuses a flaw in the MediaTek boot chain. When the bootloader is unlocked (seccfg), the Preloader skips verification of the bl2_ext partition, even though bl2_ext is responsible for verifying everything that comes after it. So if bl2_ext it's not verified and can be modified, it compromises the entire secure boot process. The exploit modifies a function called sec_get_vfy_policy() inside bl2_ext, making it always return "0", so an unverified bl2_ext running at EL3 now happily loads unverified images for the rest of the boot chain.

Additionally, the included PoC also spoofs the device’s lock state as locked so you can pass strong integrity checks anywhere while being unlocked. Someone even managed to pass Basic, Device and Strong integrity on LineageOS for Phone 2a without rooting, spoofing, using pixel fingerprint or leaked keybox.

Vivo X80 Pro is also vulnerable & it has a more severe version of the flaw, as it fails to verify bl2_ext even with a locked bootloader. You can read more about the usage of exploit here:
https://github.com/R0rt1z2/fenrir

Follow
@TechLeaksZone
❀1