RodinHub | Updates | Releases
204 subscribers
38 photos
9 videos
2 files
20 links
Poco X7 Pro | Redmi Turbo 4 | Announcements/Updates
Download Telegram
Always read the full thing.



Many of you have seen this XDA tread and thought, "oh no, there is no rollback in Xiaomi.eu or even Xiaomi!" That's not the case. This is the initial test of xiaomi.eu for our phone when they didn't know there was a region lock, the flashed rom was based on CN, thus resulted in brick.

Xioami.eu removed it from Patreon afterwards but added it back with two different roms for global and CN separately to fix this.
❀1
Forwarded from Roxy Team
Media is too big
VIEW IN TELEGRAM
Best BBK Port?

Poco X7 Pro with Color OS!

Clips by: @Naka_Haru_rs
Edit by: @Naka_Haru_rs
Music: MONTAGEM SILICONADE - Slowed
πŸ”₯2
IMPORTANT WARNING ATTENTION
A leak targeting users has been detected in the GetApps application, which is a system application in the HyperOS and MIUI systems on Xiaomi, Redmi, and Poco devices. As a result of this leak, two types of software, Malware and Adware, were detected, including the GetApps application. These software programs, which run in the background and suddenly pop up full-screen ads, and also steal personal data in the background, were specifically detected in the β€œWifiWarden” application, which is automatically installed for users. If this application is installed on your device, I would like to point out that you are at risk; everything from your photos to your bank details could be stolen. My personal recommendation is to completely uninstall this application and the GetApps application if they are installed. Wishing you a good day.
Nothing Phone 2a Bootloader Exploit Working

A new exploit called Fenrir targets the Nothing Phone 2a, CMF Phone 1 & other MediaTek-powered devices. It takes advantage of a flaw in how the phone starts up, allowing full control over the device before Android even loads. Even after waiting for 1 month, Nothing ignored the developer's bootloader vulnerability report affecting CMF Phone 1 and Phone 2a and thus developer made it exploit public.

When you power on your phone, it goes through several steps to make sure everything is secure and untampered. This is called the secure boot chain. Each of these steps is trusted only if the previous one verifies it.

1. BootROM – The first code built into the chip. It loads the next part.
2. Preloader – Loads the next component, called bl2_ext, and normally checks it.
3. bl2_ext – This runs at the highest privilege level (EL3) and is supposed to check everything else.
4. TEE (Trusted Execution Environment) – Handles secure operations like fingerprint data and encryption.
5. GenieZone – A MediaTek component that manages access to the secure system.
6. LK / AEE – Boots the Android operating system and handles crash logging.
7. Linux Kernel – This is Android. The phone is now fully booted.

This exploit abuses a flaw in the MediaTek boot chain. When the bootloader is unlocked (seccfg), the Preloader skips verification of the bl2_ext partition, even though bl2_ext is responsible for verifying everything that comes after it. So if bl2_ext it's not verified and can be modified, it compromises the entire secure boot process. The exploit modifies a function called sec_get_vfy_policy() inside bl2_ext, making it always return "0", so an unverified bl2_ext running at EL3 now happily loads unverified images for the rest of the boot chain.

Additionally, the included PoC also spoofs the device’s lock state as locked so you can pass strong integrity checks anywhere while being unlocked. Someone even managed to pass Basic, Device and Strong integrity on LineageOS for Phone 2a without rooting, spoofing, using pixel fingerprint or leaked keybox.

Vivo X80 Pro is also vulnerable & it has a more severe version of the flaw, as it fails to verify bl2_ext even with a locked bootloader. You can read more about the usage of exploit here:
https://github.com/R0rt1z2/fenrir

Follow
@TechLeaksZone
❀1
Forwarded from Roxy Team
Media is too big
VIEW IN TELEGRAM
Not so Stock - Poco X7 Pro 🀧

Clips by: @Naka_Haru_rs
Edit by: @Naka_Haru_rs
Music: MONTAGEM AMOSTRA
πŸ”₯2
πŸ†™ PixelOS Fifteen - UNOFFICIAL
#ROM #A15 #V #Rodin #PixelOS #POS

πŸ“± Device: Poco X7 Pro (rodin)
πŸ‘€ Developer: @rthedream
ℹ️ Android Version: Android 15
πŸ“† Build date: 8/09/2025
πŸ“‚ File Size: 2,8GB


🚨Flashing steps: click me!
⬇️ Download Rom : Sourceforge | Google drive | Vendor Boot
πŸ–Ό Screenshoot : Click here

πŸ—’ Changelogs:
- Shipped Dolby Atmos
- Resolve small audio strength (dirty workarounds)
- Resolved fast charging
- Resolved hotspot overlays
- Moved to Lineage lights common HAL
- Disable game default frame rate feature
- Enable ZRAM
- Minor source changes and stability improvement

❗️Known issues:
β€’ HTSR


πŸ“ Notes:
β€’ SELinux is "enforcing".
β€’ GApps build
β€’ Signed build
β€’ OTA implemented
β€’ Make sure u've backup IMEI.
β€’ Dirty flashable from old build/OTA update.

🀝 Thanks to:
β€’ @claxten, @rio113 for help
β€’ @MrZ3T4, @Tutup_oli, @Saiful220, @julesovalle, @ZTV86 for tester
β€’ @rthedream for device tree
β˜•οΈ Buy me a coffee!
β€’  Ko-fi
β€’  Dana
β€’  Saweria
- Channel : @Rodinupdate
- Discussion : @rodincommunity
❀5πŸ”₯3
I may have found the best YouTube music client.
Channel name was changed to Β«RodinHub | Updates | ReleasesΒ»
We already got auth over the global group and already have a device tree so this place kinda doesn't have a purpose anymore, imma just release stuff and leak stuff here.
Release ximi.eu 2.0.204 now or all together with 3.0?
Forwarded from POCO X7 PRO | Updates
πŸ†™ PixelOS Fifteen - UNOFFICIAL
#ROM #A15 #Rodin #PixelOS #POS

πŸ“± Device: Poco X7 Pro (rodin)
ℹ️ Android Version: Android 15
πŸ“† Build date: 11/10/2025
πŸ“‚ File Size: 3GB


🚨Flashing steps: click me! | OTA update
⬇️ Download Rom : Sourceforge | Vendor Boot | Mirror : soon..
πŸ–Ό Screenshoot : Click here

πŸ—’ Changelogs: Click here

❗️Known issues:
β€’ You tell me (gib logs or gtfo)

πŸ“ Notes:
β€’ Reflash latest fw if it doesn't boot
β€’ SELinux is enforcing.
β€’ GApps build
β€’ Signed build
β€’ OTA implemented
β€’ Make sure u've backup IMEI.
β€’ Clean flash is mandatory

🀝 Thanks to:
β€’ @claxten, @rio113, @holymee for help
β€’ @inizeydann for tester
β€’ @rthedream for device tree
β˜•οΈ Buy me a coffee!
β€’  Ko-fi
β€’  Dana
β€’  Saweria


Follow : @PocoX7Pro5GUpdates
Join : @PocoX7ProGlobal
❀2
Forwarded from Rodin Alliance
Crowdfunding POCO X7 Pro

Hey fam, The AOSP project for POCO X7 Pro by @rthedream is already rolling. Now we’re opening a crowdfunding to cover the device purchase, so the project can keep moving smooth & drama-free.

πŸ“„ Crowdfunding Agreement
To keep everything crystal clear, we’ve prepared an agreement covering:
* Dev responsibilities
* Roles of initiator & overseer
* Donor rights (supporter privileges)
* Rules of device usage
πŸ‘‰ Full agreement here: Crowdfunding Agreement

πŸ“Œ Dev Progress
Updates will be posted here:
➑️ @rthelolchex_builds

β˜•οΈ Donation Links
β€’ Ko-fi (Global, PayPal supported)
β€’ Saweria (Indonesia)
β€’ UPI (ID: charantej94@oksbi)

πŸ“Š Donation Recap
To keep full transparency, every donation will be listed & updated regularly.
@rodinalliance & github.

After donating, just send your payment screenshot to one of the admins:
πŸ‘‰ @herobuxx | @StartTrueDreams | @katajaree |

Indian users - UPI payments screenshots send to @Cherri94

The recap will include: username/name, amount, and date.

πŸ”₯ Let’s squad up and support together so the POCO X7 Pro AOSP project stays on track. And in the end, we all get to enjoy AOSP together.

πŸ™ Big thanks fam, you guys are the real MVP!
❀1