Re: [ot][spam] log: trying to take control of my free government phone

2022-11-08 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
On 11/7/22, ytooR wrote: > > Hi Karl - glad you have been able to eat. I no things have been difficult - > > Good luck! good luck, rooty !

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-07 Thread ytooR
Hi Karl - glad you have been able to eat. I no things have been difficult - Good luck! --- Original Message --- On Sunday, November 6th, 2022 at 6:33 AM, Undescribed Horrific Abuse, One Victim & Survivor of Many wrote: > things are back to normal. it appears as if it is the same.

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-06 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
things are back to normal. it appears as if it is the same.

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-06 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
while working with the boot partition i discovered the kernel may have changed :(

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-06 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
i spent some time learning about things my device’s partitions are all mounted in the ramdisk loaded by the kernel, completely separate from the system partition i’ve been reflashing. the ramdisk is in a partition in another custom android format called bootimg. there are tools online from the

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-06 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
https://source.android.com/docs/security/features/encryption/file-based#enabling-file-based-encryption FBE is enabled by adding the option fileencryption=contents_encryption_mode[:filenames_encryption_mode[:flags]] to the fs_mgr_flags column of the fstab line for userdata. This option defines the

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-06 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
missing basic and normative tools: - dump dirtree from an e2fs filesystem - extract encryption keys from device and decrypt userdata image - access device logical partitions via flashing cable other stuff the encryption key and decryption situation just looks like a lot of work to me, more than

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-05 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
i left it alone for a while and returned. after the userdata partition reflashed it behaves like the battery is busted, only powering when plugged and then not booting. given their are two compounding factors (different os release and the partition could be borked) it makes sense to wipe it and

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-05 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
to figure this stuff out, i used losetup —partscan to process the partition table of a complete flash image i took using mtkclient i’m now using that partition map to recover my old userdata partition and reflash it to get everything back how it was, maybe. this could restimulate the brick i

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-05 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
meanwhile, phhussonm the dev of the treble builds i was using on this phone, has apparently left dev work. the last release is now the one i was running. i’m planning to downgrade to one more stable. i flashed the factory super partition, and the phone booted to recovery and complained of

Re: [ot][spam] log: trying to take control of my free government phone

2022-11-05 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
my phone has bricked and i am trying to reflash it. unfortunately i have lost copy of the “persist” partition. while it is bricked, this partition is strangely mutating. i believe i may have uploaded it to w3.storage, but it doesn’t seem to be downloading from the ipfs hash i have. i am still

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-22 Thread Undiscussed Past Horrific Abuse, One Victim Of Many
I'd like to add that I'm not really conscious of the phone misbehaviors. If I knew they were malicious, I would take my devices to authorities or security consultants or whatnot, but I can't tell if I'm imagining them or not because I have amnesia around the intermittent things, neurologic

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-22 Thread Undiscussed Past Horrific Abuse, One Victim Of Many
Phh treble android 12 has been working incredibly on this low end phone for me, but today misbehaviors began accumulating to the point of notability again. Although the phone is still incredibly more responsive than on its factory OS. - popups prevent use of OpenKeychain("ChromeSync" one word,

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-21 Thread Undiscussed Horrific Abuse, One Past Victim of Many
I found it documented that the HPP-L55B contains this mediatek chipset. It is a different phone from the L55B that contains a unisoc. The person who suggested they were the same on a chat made a mistake. I've been having trouble moving, holding goals, eating food, for many hours now, ever

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-20 Thread Undiscussed Horrific Abuse, One Victim of Many
android 12 works with temporary permission enabling i'm jumping through adb hoops to set partitions back up

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-20 Thread Undiscussed Horrific Abuse, One Victim of Many
i got my app working in android 11. the v313 image has a bug where there is no app switcher. maybe early dev of a few things. to make the app work, i had to enable an android permission that i had not enabled in android 12. so i'm trying android 12 again.

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-20 Thread Undiscussed Horrific Abuse, One Victim of Many
the android 11 build has this google thing where, if you use google services framework and the system is not registered with google, it boms you with constant loud popups about that being the case. in order to resolve it, i had to navigate the popups to both register an account with the device,

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-20 Thread Undiscussed Horrific Abuse, One Victim of Many
bf6ebf2485a112e4293db8014a9f9f8ec63f65724856d6c62e7b785d3ad7e3a1f20c098ed510406376387c70799470ccda5fd2c6d10a6ec295dc54df37c3e26f v313-2022-07-20-system-roar-arm32_binder64-ab-gogapps.img size=1550332304 boots=true an app i wanted to use wasn't working in android 12, so i'm trying android 11

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-20 Thread Undiscussed Horrific Abuse, One Victim of Many
from https://forum.xda-developers.com/t/how-to-decrypt-and-split-adopted-storage.3383666/ # How to partition and to have adopted storage at same time. You don't need to root your device but the device i done this with is rooted 1. You need to enabled Developer Options. 2. Enable the USB

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-20 Thread Undiscussed Horrific Abuse, One Victim of Many
9bbe800b250d3d80a6b3bfc650ea59154870c5161e8fce7a9c4cb31beb619c8edeb15dd4672adabd7b19fa0905617c3a0e45d907ebb80c40dbb0cf0e6e1a3d5b v415-2022-07-20-system-squeak-arm32_binder64-ab-gogapps.img size=1905078272 boots=true the phone is much slower after boot with the google services framework and other

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-20 Thread Undiscussed Horrific Abuse, One Victim of Many
before flashing

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-20 Thread Undiscussed Horrific Abuse, One Victim of Many
other roms than vanilla didn't work on my phone, which makes it hard to activate apps i've purchased in the past, or use google services when appropriate. i asked in one of the chats and learned that fastboot will resize my system partition up if i delete the product partition with fastboot

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
it is so incredible how responsive this phone is now previously, i would tap or swipe part of the screen, and it would register touches elsewhere, and it was impossible to do anything it just does what i say to do now it is like having palsy and having it go away

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
none of the images with, like, an app store on them, fit on the partition given there is read/write access to the whole flash, it could be repartitioned. the userdata partition is much larger than the system partition, and with an open rom userdata could be moved entirely to a microsd card. the

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
b2sums 71ad9faaef18ceb973c527db29cb1fc3f27ab2286b49e7f4238645f4048815d6ad18773ed52455aecfae7d7221daaab183b9f55a92e545cc36601d1970dda26f v415-2022-07-19-system-squeak-arm32_binder64-ab-vanilla.img size=1308471296 boots=true my partitions from the image i took:

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this worked. the phone is now running the open source treble OS, android 12. i did not have to change the secure boot partition. - unlock the phone using mtkclient da seccfg unlock [link for details a couple posts back] - reboot into fastbootd, the graphical fastboot, and flash the system image

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
ok, there are two different fastboots. the userspace fastboot, fastbootd, can look inside the super partition. when this one is running, there is a graphical menu on the phone saying "fastbootd" and `fastboot getvar is-userspace` returns "yes". the simpler one doesn't look inside super and returns

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
fastboot is giving me 'this partition doesn't exist' even when updated to latest version :/ i can see 'system' listed in the header of super.bin

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
so unlocking bootloader: https://www.hovatek.com/forum/thread-40300.html flashing treble_experimentations: https://www.xda-developers.com/flash-generic-system-image-project-treble-device/ the system partition is inside the extended super partition it has secure boot enabled, so there are more

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the 'super' partition had about the same size and i tried to flash it. this made it bootloop into fastboot. it turns, websearching, that 'super' is an extended partition, that contains 'system' inside it as a logical partition. i reflashed my imaged super and the phone works again, AND ! it

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i don't know what partition to flash it onto !

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the dance of $ mtk e metadata,userdata,md_udc $ mtk da seccfg unlock ran without error and i'm trying out https://github.com/phhusson/treble_experimentations/releases/download/v415/system-squeak-arm32_binder64-ab-vanilla.img.xz i expect i have more to do, though, before a gsi image will just run

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this page appears to enumerate the commands to unlock mediatek phones: https://www.droidwin.com/unlock-bootloader-on-mediatek-devices-using-mtkclient there are 3 fastboot commands to try, and then some mtk downloadagent tricks

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
totally just imaged every partition in my phone with mtk rl

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
mtkclient actually works without the kernel patch ! $ mtk printgpt DA_handler - Device is unprotected. DA_handler - Device is in Preloader-Mode :( DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping ..

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
totally a unisoc-branded mediatek 6739 $ adb shell getprop [Build.BRAND]: [MTK] [camera.disable_zsl_mode]: [1] [dalvik.vm.appimageformat]: [lz4] [dalvik.vm.dex2oat-Xms]: [64m] [dalvik.vm.dex2oat-Xmx]: [512m] [dalvik.vm.dex2oat-max-image-block-size]: [524288] [dalvik.vm.dex2oat-minidebuginfo]:

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
if you're using gcc 9 on a system designed for gcc 4, you'd better do PATH=/bin:/usr/bin:/sbin:/usr/sbin before building your 3.10 kernel sources.

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i added the patch to my specfile and am building a new rpm i canceled the unihertz titan build. the host had been running for 6 hours. i'm just a little confused.

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
haha the patches are for linux 5.x and i have linux 3.x might not be as big as it sounds since the versioning changed, but it sounds ridiculously big

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
successful reboot

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i'm installing a free kernel from centos 7 to try it out. of course, this is probably a different kind of phone, it might be interesting, and at least might give me an error i can websearch for. my system may fail to reboot, in which case it could be a while ;p i'm thinking maybe for working

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
unfortunately i don't presently have access to my kernel sources to try any mtk exploits that come with mtkclient. mediatek wrote a linux kernel driver that engages the boot loader, and mtkclient patches it. i'm on a redhat enterprise linux system that has expired. mtkclient]$ python3 mtk

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i'm thinking i could probably make this phone work by just treating it like a mediatek phone. i'm wondering if when spreadtrum rebranded to unisoc, they outsourced some of their stuff to mediatek or whatever mediatek uses, like other companies do as other companies grow bigger faster than they

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
there are a lot more bootloader commands at https://github.com/bkerler/mtkclient/blob/main/mtkclient/Library/mtk_preloader.py#L48 i'm thinking it would make sense to dump the ram and look for OEM commands in it.

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
$ fastboot getvar all (bootloader) max-download-size: 0x800 (bootloader) variant: (bootloader) logical-block-size: 0x200 (bootloader) erase-block-size: 0x8 (bootloader) hw-revision: cb00 (bootloader) battery-soc-ok: yes (bootloader) battery-voltage: 3823mV (bootloader) partition-size:sgpt:

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i'm realising that i can figure out the sizes and orders of partitions without needing root access the other phone used a gpt partition table i might be able to make a partition map by hand, to try the factory tools

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i tried to search xda for mt6739 information and am getting this error: "The forums are currently offline while we are performing system maintenance. Be back soon!" google shows that there is indeed discussion around the mt6739 given the use of hw_code and separate use of platform, there is

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this hardware code is actually in the mediatek platform table 0x0699: 0x6739 this unisoc chipset might be an MT6739 i found you can try to compare the two chipsets at phonedb.net unisoc chipset: https://phonedb.net/index.php?m=processor=769=spreadtrum_sc9832e mediatek chipset:

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
these lines explain a lot of how the mediatek exploit i was reviewing a session or two on these phones worked: CMD_READ16 0xa2Read data from the SoC memory (16 bit length parameter) CMD_WRITE16 0xd2Write data into SoC memory (16 bit length parameter) CMD_READ32 0xd1Read

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
these commands are apparently documented for the mediatek preloader here: http://www.lieberbiber.de/2015/07/04/mediatek-details-partitions-and-preloader/ ! i'm not certain yet whether that means that this unisoc chipset is based on mediatek, or if it is some shared thing that both use.

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
so, i tried booting up the mediatek flasher, to see if it would do anytihng, and ran into the same issue i ran into with the unisoc flasher: it refuses to run unless you provide it with a partition map in advance, and i haven't found a factory image for this phone yet. _however_, i know from

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
left out: i could also look harder for ways to root the phone, or to access its flash storage internally [it would be great to pick up the flash reads with a near-field radio but i have separate inhibition around that goal, so it seems a separate thing]

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the oem command does not work on this phone. i did find at https://www.xda-developers.com/how-to-discover-hidden-fastboot-commands/ that oem commands are likely sent as strings straight to the device, and can usually be enumerated by grepping for strings in the boot loader. the device has a

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
On 7/19/22, Undiscussed Horrific Abuse, One Victim of Many wrote: > this link seems helpful, if untrustworthy: > https://romprovider.com/xiaomi-qin2-pro-unlock-bootloader/ it contains > a google drive link to android_device_unlock.rar i've uploaded the version of the .rar at that website to

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
after rebooting my system back to linux, it actually unhibernated! often it will just boot up again, fscking the disk to handle nothing having been cleanly closed. it is great to have the hibernation-resuming working this time.

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this link seems helpful, if untrustworthy: https://romprovider.com/xiaomi-qin2-pro-unlock-bootloader/ it contains a google drive link to android_device_unlock.rar the original post seems helpful, but most of the primary material seems to be in russian, a language i have not myself learned yet. my

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
it looks like there is a modified fastboot binary being used, that can extract a special code from the phone that can be used to unlock it it seems like it makes sense to try to get ahold of that binary, run it, and figure out what its secret protocol is

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i websearched for some time. the chipset is SC9832E, and looking for that chipset i found similar experiences to mine, where oem unlocking can be enabled but fastboot still fails. there's some documentation of working around this for the qin 2 pro at

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
so, the windows flasher i tried needs a .pac file for the phone . it needs two partitions from it, and won't do much of anything without them, including apparently downloading data from the phone. i'm not sure where to find this factory image for this phone, but could look more places. another

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
but i'll at least reboot into windows and try a factory flasher out! there are at least 3 different factory flashers i'm imagining there's a good chance an exploit or opening the hardware would be needed to reflash the phone. this is likely increasing my dissociated discouragement.

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the unisoc chipset is SC9832E not sure how long i'll be able to keep doing this atm

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
"Reboot to bootloader" places it into the same-looking system as the unihertz titan, where it is waiting for commands from fastboot. unfortunately, when i do "fastboot flashing unlock", it says "unlock failed" :( so flashing this phone may be a long-term adventure in learning the bootloaders and

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i did an `adb reboot fastboot` and it completely worked. takes me to a fastbootd menu on the phone one of the entries says "Secure boot - yes", which could be discouraging options include "Enter recovery" and "Reboot to bootloader"

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
then with usb debugging enabled: [3974182.695809] usb 1-4: new high-speed USB device number 42 using xhci_hcd [3974182.819725] usb 1-4: New USB device found, idVendor=0e8d, idProduct=201c, bcdDevice= 2.23 [3974182.819732] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3

Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
dmesg when running and plugged in: [3974073.464782] usb 1-4: New USB device found, idVendor=0e8d, idProduct=2008, bcdDevice= 2.23 [3974073.464790] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [3974073.464795] usb 1-4: Product: HPP-L55B [3974073.464799] usb 1-4: Manufacturer: