Samsung Galaxy Watch mActive 2 (GWA2) - Samsung Galaxy Watch

Last week I got my GWA2 from Germany and I'm very disappointed. Samsung Pay is still not available and changing region with SDBstarterKidv1 does not work. SDB and CSC.Manager execute without error messages on the PC but the region selection is not displayed on the watch's screen. Did Samsung block the possibility to change a region?
Why buy a watch where the advertised features are not available maybe in the future? ECG - 2020?, Fall Detection sometime, Blood Pressure - the App My BP Lab 2.0 is easy to install but does not work with the hardware, calibration stops after 10%..
Maybe Galaxy Watch Active 3 or 4 comes close to Apple watch!

Can you give maybe more details...
Model Name... Firmware Version...
What exact not work with SDB?
As you know... nobody have Crystal Ball...
Btw. I am better in German language...
Best Regards

Galaxy Watch Active 2
adfree said:
Can you give maybe more details...
Model Name... Firmware Version... SM-R820 Galaxy Watch Active 2(E8F5) UI-Ver. 1.5 Tizen-Vers. 4.0.0.6
What exact not work with SDB? ….M.E. funktioniert SDB einwandfrei, nur erfolgen keine Ausgaben auf dem Uhr-Display.
Nach dem sdb connect erfolgt keine 'Debugging RSA Key ...' durch die Active 2.
Die App 'csc-manager.csc-pre-configuration' wird ausgeführt, aber es erscheint kein Auswahl-Menü auf der Uhr.
As you know... nobody have Crystal Ball...
Btw. I am better in German language...
Best Regards
Click to expand...
Click to collapse
Freundliche Grüsse
eboeschen

Registered on 16.09. and already mocking samsung. Apple fanboy.
Sent from my SM-G975F using Tapatalk

adfree said:
Can you give maybe more details...
Model Name... Firmware Version...
What exact not work with SDB?
As you know... nobody have Crystal Ball...
Btw. I am better in German language...
Best Regards
Click to expand...
Click to collapse
While inviting another member (especially one with only one post), it is better to tell him the rules of XDA (which, as a senior member, you should also know).
English is the language to be used on XDA. If another language is to be used, the English version should be on top with the other language version following it.
eboeschen said:
Freundliche Grüsse
eboeschen
Click to expand...
Click to collapse
Please note the above guideline and refrain from using another language only.
In addition, do not edit the post you are quoting. Post yours below the quote. This will make reading easier instead of hunting in the quoted post.

Same story with me: successfully linked my PC with the watch, did "sdb shell", but "launch_app csc-manager.csc-pre-configuration" did nothing on the watch's side, although the shell says "... successfully launched"
The watch is Galaxy Watch Active 2, bought in Germany. The goal is to change the region to SER to activate SPay.
csc-manager app is indeed there:
sh-3.2$ ls
com.samsung.alarm-mobile-alert-solis com.samsung.samsung-pay-app com.samsung.w-reminder
com.samsung.alarm-solis com.samsung.samsung-pay-guide-app com.samsung.w-taskmanager
com.samsung.app-list-backup-service com.samsung.sdbd-syspopup com.samsung.watch-utils
com.samsung.app-version-sync-popup com.samsung.setting-location com.samsung.watchface
com.samsung.app-widget com.samsung.shealth_gear com.samsung.weather
com.samsung.b2-setup-wizard com.samsung.sketch com.samsung.wemail
com.samsung.bluetooth com.samsung.skmsa com.samsung.wifi
com.samsung.bluetooth-testmode com.samsung.stopwatch-wc1 com.samsung.wifi-test
com.samsung.bt-syspopup com.samsung.supl-syspopup com.samsung.windicator
com.samsung.ciss com.samsung.testmode com.samsung.wis-backup-service
com.samsung.clocksetting com.samsung.timer-wc1 com.samsung.wnotification2
com.samsung.contacts-backup-service com.samsung.tizen.bixby com.samsung.worldclock
com.samsung.daily-briefing com.samsung.tizen.bixby-provisioning csc-app
com.samsung.dqagent com.samsung.tizen.bixby-voice csc-manager
com.samsung.emergency-message com.samsung.tizen.bixby-wakeup-service health-data-service
com.samsung.factory-clientw com.samsung.tizen.iva-service ise-engine
com.samsung.factory-nfchce com.samsung.tizen.samsung-account ise-languagepack-mgr
com.samsung.flash-light com.samsung.tizen.samsung-account.ui ise-multilingual
com.samsung.fmg com.samsung.tizenseckeystring net.stc-popup
com.samsung.fmm com.samsung.tts-setting net.wc-popup
com.samsung.fota-consumer com.samsung.tzdata-update-popup net.wc-syspopup
com.samsung.gearstore com.samsung.unit-test-device nfc-manager
com.samsung.iap-galaxyapps-consumer com.samsung.unit-test-input nfc-test
com.samsung.idle-clock-emergency com.samsung.unit-test-mm org.tizen.accessibility-setting
com.samsung.idle-clock-ups com.samsung.unit-test-network org.tizen.app-selector
com.samsung.idle-service com.samsung.unit-test-sensor org.tizen.crash-syspopup
com.samsung.ime-backup-service com.samsung.update-service org.tizen.dpm-syspopup
com.samsung.iot-resource-service com.samsung.voice-tos-app org.tizen.fido-syspopup
com.samsung.knox.license-viewer com.samsung.w-calendar2 org.tizen.heremaps-uc
com.samsung.knoxcustom-exitui com.samsung.w-call org.tizen.inputmethod-setting
com.samsung.knoxenrollmentservice-efl com.samsung.w-call-settings org.tizen.isf-kbd-mode-changer
com.samsung.logs-backup-service com.samsung.w-clock-viewer org.tizen.powerkey-syspopup
com.samsung.mapcontrol com.samsung.w-contacts2 org.tizen.privacy-setting-popup
com.samsung.mdec-consumer com.samsung.w-eas-it-policy org.tizen.screen-reader
com.samsung.message com.samsung.w-emergency-keypad org.tizen.stt-engine-default
com.samsung.message-backup-service com.samsung.w-gallery org.tizen.system-syspopup
com.samsung.nfc-setting-app com.samsung.w-home org.tizen.tts-engine-default
com.samsung.nfc-syspopup com.samsung.w-input-selector org.tizen.tzdata
com.samsung.pwlock com.samsung.w-lockscreen org.tizen.widget_viewer_sdk
com.samsung.runestone-core com.samsung.w-lockscreen-setting sem_daemon
com.samsung.runestone-gear com.samsung.w-logs2 smartcard-service
com.samsung.runestone-setting com.samsung.w-manager-service smartreply-service
com.samsung.safetyvolume-syspopup com.samsung.w-media-controller w-secure-element
com.samsung.samsung-account-front com.samsung.w-music-player xwalk-service
Click to expand...
Click to collapse

Life1ess said:
Same story with me: successfully linked my PC with the watch, did "sdb shell", but "launch_app csc-manager.csc-pre-configuration" did nothing on the watch's side, although the shell says "... successfully launched"
The watch is Galaxy Watch Active 2, bought in Germany. The goal is to change the region to SER to activate SPay.
csc-manager app is indeed there:
Click to expand...
Click to collapse
did you succeed to solve this problem? it happens the same to me with my german active 2

I will upload for SM-R820:
A
Code:
COMBINATION-FT40_R820XXU1ASI2.tar.md5
B
Code:
AP_R820XXU1ASHF_usr.tar.md5
BL_R820XXU1ASHF_usr.tar.md5
CSC_OXA_R820OXA1ASHF_usr.tar.md5
C
netOdin is here since years:
https://forum.xda-developers.com/showpost.php?p=73503787&postcount=150
UNTESTED with the new devices... OWN RISK!
Maybe the good old trick still work with Combination Firmware + CSC... and Code:
Code:
*#272*719434266344#
Need "few" minutes for upload...
Best Regards
Edit 1.
Combination Firmware for SM-R820:
https://www.file-upload.net/download-13731697/COMBINATION-FT40_R820XXU1ASI2.tar.md5.7z.html
Edit 2.
Stock Firmware for CSC...
https://www.file-upload.net/download-13731710/smR820XXU1ASHF.7z.html

Any more luck in this area???

adfree said:
I will upload for SM-R820:
A
Code:
COMBINATION-FT40_R820XXU1ASI2.tar.md5
B
Code:
AP_R820XXU1ASHF_usr.tar.md5
BL_R820XXU1ASHF_usr.tar.md5
CSC_OXA_R820OXA1ASHF_usr.tar.md5
C
netOdin is here since years:
https://forum.xda-developers.com/showpost.php?p=73503787&postcount=150
UNTESTED with the new devices... OWN RISK!
Maybe the good old trick still work with Combination Firmware + CSC... and Code:
Code:
*#272*719434266344#
Need "few" minutes for upload...
Best Regards
Click to expand...
Click to collapse
Thank for you providing the files. Is there any chance to get stock for a different CSC, preferably OXE?

Did anybody have any luck with changing CSC to get Samsung Pay on their GWA2?

adfree said:
I will upload for SM-R820:
A
Code:
COMBINATION-FT40_R820XXU1ASI2.tar.md5
B
Code:
AP_R820XXU1ASHF_usr.tar.md5
BL_R820XXU1ASHF_usr.tar.md5
CSC_OXA_R820OXA1ASHF_usr.tar.md5
C
netOdin is here since years:
https://forum.xda-developers.com/showpost.php?p=73503787&postcount=150
UNTESTED with the new devices... OWN RISK!
Maybe the good old trick still work with Combination Firmware + CSC... and Code:
Code:
*#272*719434266344#
Need "few" minutes for upload...
Best Regards
Edit 1.
Combination Firmware for SM-R820:
https://www.file-upload.net/download-13731697/COMBINATION-FT40_R820XXU1ASI2.tar.md5.7z.html
Edit 2.
Stock Firmware for CSC...
https://www.file-upload.net/download-13731710/smR820XXU1ASHF.7z.html
Click to expand...
Click to collapse
Hello, I tried it but it doesn't work. It seems like after the code insert the CSC doesn't change.
In fact after the choose and the reboot in the software information there still is the old CSC code and after the stock flash Samsung Pay does not appear.
Where did you find the firmware?

@Eziooo
Can you check please Videos from this Thread...
https://forum.xda-developers.com/showpost.php?p=75846867&postcount=469
It seems like after the code insert the CSC doesn't change.
Click to expand...
Click to collapse
After watching Videos... can you please "compare"...
Because no idea what you see... nor what you set...
Best Regards

adfree said:
@Eziooo
Can you check please Videos from this Thread...
https://forum.xda-developers.com/showpost.php?p=75846867&postcount=469
After watching Videos... can you please "compare"...
Because no idea what you see... nor what you set...
Best Regards
Click to expand...
Click to collapse
I mean, I have the DBT CSC stock in my watch, I followed the steps in the first post of this thread:
https://forum.xda-developers.com/smartwatch/gear-s3/succesfully-changed-csc-to-xar-to-t3718236
but when I insert the code *#272*719434266344# (like in the video 2 you linked) and the watch reboots, I chech the software information and there still is the "DBT" at the and of the software version, like nothing changed.
And when I flash the stock firmware at the end I don't have the Samsung Pay app..

sammysams said:
Did anybody have any luck with changing CSC to get Samsung Pay on their GWA2?
Click to expand...
Click to collapse
Nop. Same German active 2 and same problem. CSC change doesn't appears on watch screen. I'm afraid my watch is ready to go back to germany

Same problem
SynStratos said:
did you succeed to solve this problem? it happens the same to me with my german active 2
Click to expand...
Click to collapse
Same problem. German GWA2 and "succesfully launched" but nothing happens. . I fight and fight, but now I'm tired...

Thank for you providing the files. Is there any chance to get stock for a different CSC, preferably OXE?
---------- Post added at 08:36 AM ---------- Previous post was at 08:29 AM ----------
Thank for you providing the files. Is there any chance to get stock for a different CSC, preferably PHE?

https://forum.xda-developers.com/showpost.php?p=80172836&postcount=793
Code:
engineer-mode-on.sh
Maybe something like this is required... to write to CSA...
OWN RISK!
If I had such device... I would log... maybe some infos available what is blocked or disabled or what failed...
Best Regards

Is somebody able to check few things?
Example from my SM-R760...
Code:
sh-3.2$ ls
apps_rw data media share
sh-3.2$ cd ..
sh-3.2$ cd /
sh-3.2$ ls
%{TZ_USER_SHARE} boot dev home lost+found mnt proc run srv tmp var
bin [B]csa[/B] etc lib media opt root sbin sys usr
sh-3.2$ cd csa
sh-3.2$ ls
00000000.authtokcont ese nv sensor wd
TEE factory prov skpm_OTA_CSR_OCF_ECC_P256
bluetooth imei prov_data skpm_sk.dat
csc lost+found recovery skpm_supported_list
sh-3.2$ cd csc
sh-3.2$ ls
csc-active-customer.inf
sh-3.2$ [B]cat /csa/csc/csc-active-customer.inf[/B]
[B]XAR[/B]
sh-3.2$ cd ..
sh-3.2$ cd imei
sh-3.2$ ls
MSL_address.dat MSL_code.dat prodcode.dat serialno.dat
sh-3.2$ [B]cat /csa/imei/prodcode.dat[/B]
SM-R760NDAA[B]XAR[/B]
sh-3.2$
A.
Good to know if CSA is accessable without Root?
Code:
cd /csa
ls
If no... Combination Firmware with Root is usefull...
If yes...
B.
Code:
cat /csa/csc/csc-active-customer.inf
In my Example you see XAR for USA...
With open eyes you can see... Production Code also contains CSC text string...
Code:
cat /csa/imei/prodcode.dat
C.
1 method for Logging is... enter Code after your action...
Code:
*#9900#
Maybe you can see by open eyes... why this fail or is blocked...
Code:
launch_app csc-manager.csc-pre-configuration
D.
You can try this and report what happens... Watch explode... your Dog or your Cat?
Code:
launch_app csc-manager.csc-verifier
Best Regards

adfree said:
Is somebody able to check few things?
Example from my SM-R760...
Code:
sh-3.2$ ls
apps_rw data media share
sh-3.2$ cd ..
sh-3.2$ cd /
sh-3.2$ ls
%{TZ_USER_SHARE} boot dev home lost+found mnt proc run srv tmp var
bin [B]csa[/B] etc lib media opt root sbin sys usr
sh-3.2$ cd csa
sh-3.2$ ls
00000000.authtokcont ese nv sensor wd
TEE factory prov skpm_OTA_CSR_OCF_ECC_P256
bluetooth imei prov_data skpm_sk.dat
csc lost+found recovery skpm_supported_list
sh-3.2$ cd csc
sh-3.2$ ls
csc-active-customer.inf
sh-3.2$ [B]cat /csa/csc/csc-active-customer.inf[/B]
[B]XAR[/B]
sh-3.2$ cd ..
sh-3.2$ cd imei
sh-3.2$ ls
MSL_address.dat MSL_code.dat prodcode.dat serialno.dat
sh-3.2$ [B]cat /csa/imei/prodcode.dat[/B]
SM-R760NDAA[B]XAR[/B]
sh-3.2$
A.
Good to know if CSA is accessable without Root?
Code:
cd /csa
ls
If no... Combination Firmware with Root is usefull...
If yes...
B.
Code:
cat /csa/csc/csc-active-customer.inf
In my Example you see XAR for USA...
With open eyes you can see... Production Code also contains CSC text string...
Code:
cat /csa/imei/prodcode.dat
C.
1 method for Logging is... enter Code after your action...
Code:
*#9900#
Maybe you can see by open eyes... why this fail or is blocked...
Code:
launch_app csc-manager.csc-pre-configuration
D.
You can try this and report what happens... Watch explode... your Dog or your Cat?
Code:
launch_app csc-manager.csc-verifier
Best Regards
Click to expand...
Click to collapse
I tried to follow your steps on my watch and this is the result:
sh-3.2$ ls
apps_rw data media share
sh-3.2$ cd ..
sh-3.2$ cd /
sh-3.2$ ls
afpc boot dev home lost+found mnt opt root sbin sys usr
bin csa etc lib media nuget proc run srv tmp var
sh-3.2$ cd csa
sh-3.2$ ls
00000000.authtokcont bluetooth ese imei prov recovery skpm_FACTORY_OCF_ECC_P256
TEE csc factory lost+found prov_data sensor wd
sh-3.2$ cd csc
sh-3.2$ ls
csc-active-customer.inf
sh-3.2$ cat /csa/csc/csc-active-customer.inf
DBTsh-3.2$ cd ..
sh-3.2$ cd imei
sh-3.2$ ls
prodcode.dat serialno.dat smsn.dat
sh-3.2$ cat /csa/imei/prodcode.dat
SM-R820NZKADBTsh-3.2$
Hope it may help you.
launch_app csc-manager.csc-verifier does nothing, the code *#9900# opens a secret menu..

Related

[Q] problem creating bootmenu

Hi guys i have a problem creating the bootmenu
I am following this post but when i'm going to 3rd line:
C:/> adb shell
$ su
# cp -R /sdcard/bootmenu /data/bootmenu
# cd /data/bootmenu
# chmod 755 *
# ./install.sh
# rm -R /data/bootmenu
i get the following message: cd: can't cd to /data/bootmenu
could you tell me please what i'm doing wrong???
Post the output of
# ls -l /data/bootmenu
Maybe it does not exist OR it is a file (it will be a file if /sdcard/bootmenu was one)
But in any case: It's much easier to install 2nd-init directly from the android market: The currently included version 0.45 works good enough to install the CM7 port (afterwards you'll have 0.51 anyway as the port includes it's own version)
pabx said:
Post the output of
# ls -l /data/bootmenu
Maybe it does not exist OR it is a file (it will be a file if /sdcard/bootmenu was one)
But in any case: It's much easier to install 2nd-init directly from the android market: The currently included version 0.45 works good enough to install the CM7 port (afterwards you'll have 0.51 anyway as the port includes it's own version)
Click to expand...
Click to collapse
Ok thanks! I saw today new version of this that include 0.5.1

CSCTools 0.1 beta for Samsung

These apps will help you dump a csc and make your own csc image!
1.convert Samsung org csc(Ra000FF) or CSC.D000FF to real csc file.
cmdline: CSCConverter.exe -d i917ATTJK2.csc.Ra000FF i917ATTJK2.csc
CSCConverter.exe -d CSC.D000FF CSC.csc
PS: if you dumped a CSC.D000FF file, app will show you CSC Max Block Count, remember this, we will use it!
2.dump csc file and have a csc script file.
cmdline: CSCBuilder.exe -d i917ATTJK2.csc i917ATTJK2.txt
3.edit files and script file, then build a new csc file.
cmdline: CSCBuilder.exe -b i917ATTJK2_new.csc i917ATTJK2.txt
4.convert csc file to D000FF.
cmdline: CSCConverter.exe -b i917ATTJK2.csc CSC_new.D000FF 42
PS: 42 is i917 CSC Partition Max Block Count, I think it's same as i8700.
5.have fun with custom csc!
PS:
UAInput.000 in CSC is like a copy file script.you can use CSCPackage.cab.pkg to do this, but make sure cab signed cert is in your custom rom.
samsung WP7 device first boot:
1.copy CSCPackage.cab.pkg to \OSRoot\UpdateBin\CSCPackage.cab.pkg.
2.run SLDR to update CSCPackage.cab.pkg to Rom.
3.boot.
USAGE:
CSCConverter -d <CSC.D000FF/CSC.Ra000FF> <CSC File>
CSCConverter -b <CSC File> <CSC.D000FF> <Max Block Count>
CSCConverter -br <CSC File> <CSC.Ra000FF> <Max Block Count> (*not completed!)
CSCBuilder -d <CSC File> <CSC Script>
CSCBuilder -b <CSC File> <CSC Script>
Best Regards
Ego Zheng
2012/02/11
thanks
4.convert csc file to D000FF.
cmdline: CSCBuilder.exe -b i917ATTJK2.csc CSC_new.D000FF 42
PS: 42 is i917 CSC Partition Max Block Count, I think it's same as i8700.
on omnia7 its the same "42"
thanks for the app's real cool
Edit:
4.convert csc file to D000FF.
cmdline: CSCConverter.exe -b i917ATTJK2.csc CSC_new.D000FF 42
PS: 42 is i917 CSC Partition Max Block Count, I think it's same as i8700.
your text was/wrong
thank you very much
Fantastic~~This reminds me of my research of Nexus S's CSC carrier info modification~
And you are Ego? I didn't recognize you yesterday in my thread...since your ID is different from DFT Forum~~sorry for that...
Good work!
GREAT! I think this is just what I wanted! If I am correct in my assumption, using CSC we can debrand our phone and make custom registry edits like interop-unlock and enable ICS without needing to build/flash a whole ROM, right?
EDIT: So I made a CSC to debrand the ATT Focus and stop the 'Now' xap from being pinned but... after sucessfully flashing it to the phone and hard-resetting nothing changed. So I guess that means the only way to apply is to build it into the ROM or send the update cab which also means you have to rebuild the ROM with your own cert...

termux question

Asking for help. If someone willingly to help me, I need to figure what happens on other's S20. TY!
Can someone please run this command from termux (or another terminal's apps):
# cat /dev/jsqz
And paste me the output, please ! Thanks a lot
Code:
$ getprop ro.product.product.model; cat /dev/jsqz
SM-N986U1
cat: /dev/jsqz: No such file or directory
edit...
ops, just noticed S20, not Note 20.

[LG V50] temp root exploit via CVE-2020-0041 including magisk setup

temp root exploit for LG V50 ThinQ with android 10 firmware
including temporal magisk setup from the exploit​
The exploit uses CVE-2020-0041 originally designed for Pixel 3 running kernel 4.9.
I have adapted the Pixel 3 specific exploit for kernel 4.14 that is used with LG phones running Android 10 with March security patch level.
This work has been done upon request of @Inerent who contributed not only with very fine donations, but also did all the testing on his LG phone, as I do not own any LG phone myself.
As an addon I have implemented setup of magisk v20.4 from temp root exploit included su permission asking notification support, that has been also a hell of work to get working.
SUPPORTED TARGETS
You can find currently running fw version with 'getprop ro.vendor.lge.factoryversion' command run in an adb shell.
LMV500NAT-00-V20m-LAO-COM-MAR-10-2020+0 - LG V50 ThinQ with V500N20m fw, 2020-03-01 security patch level
LMV500NAT-00-V20f-LAO-COM-JAN-31-2020+0 - LG V50 ThinQ with V500N20f fw, 2020-01-01 security patch level
LMV500NAT-00-V20b-LAO-COM-DEC-23-2019+0 - LG V50 ThinQ with V500N20b fw, 2019-12-01 security patch level
LMV500AT-00-V20g-LAO-COM-MAR-10-2020+0
LMV500AT-00-V20a-LAO-COM-JAN-24-2020+0
LMV500AT-00-V20e-LAO-COM-JAN-23-2020+0
LMV450AT-00-V20a-LAO-COM-JAN-15-2020-ARB00+2 - LG V50 ThinQ Sprint fw, 2020-01-01 security patch level
Please note, it is unlikely that any other fw version than those listed above would work.
The only (unlikely) case when the exploit could work with different fw version (or different phone model) would be that they would use binary identical kernel image in the firmware.
USAGE HOWTO
be sure to run supported firmware version on your phone (you may need to downgrade, involving factory reset)
enable developer mode options and in there adb debugging (eventually install adb drivers)
download the v50g8-mroot3.zip with the exploit attached in this post and unzip it
use 'adb push v50g8-mroot3 /data/local/tmp' and get temp root with following commands in 'adb shell':
Code:
cd /data/local/tmp
chmod 755 ./v50g8-mroot3
./v50g8-mroot3
If it worked, you should see something like this:
Code:
[+] Mapped 200000
[+] selinux_enforcing before exploit: 1
...
[+] Launching privileged shell
root_by_cve-2020-0041:/data/local/tmp # getenforce
Permissive
root_by_cve-2020-0041:/data/local/tmp # id
uid=0(root) gid=0(root) groups=0(root) context=kernel
root_by_cve-2020-0041:/data/local/tmp #
In case you get 'target is not supported', you may list supported targets with
Code:
./v50g8-mroot3 -T
and try to force one close to yours using '-t num' option.
Please see the 2nd post for magisk setup from temp root details.
Please be careful what you use the temp root for.
Changing something in partitions protected by dm-verity (or Android Verified Boot 2.0), like for example /system, /vendor or kernel boot partition, can result with a not anymore booting phone.
In such case you would need a way to emergency flash stock firmware to recover.
This is why it is called 'temp root' - you get a root shell only temporarily, it is lost with reboot and it does not allow to make permanent changes in crucial partitions until bootloader unlock is achieved.
Some partitions might still be possible to modify - for example in case of sony xperia phones it was possible to do permanent debloat via changes in /oem partition and such debloat would survive even factory reset. Similarly some modem configs have been present in /oem allowing to setup IMS for different operators/regions or tune other modem related stuff.
SOURCES
Exploit sources for all releases are available at my github here.
CREDITS
Big thanks to Blue Frost Security for the excellent writeup and the exploit itself.
DONATIONS
If you like my work, you can donate using the Donate to Me button with several methods there.
Already donated:
@Catalin Oprea ($710)
Luis Rosado ($30)
Kirn Gill ($6) LG V60 user
Android Maisters ($30)
Matthew Hinkle ($40)
Daniel Novo ($22)
Tony Romeo ($56)
Yurii Boiko ($20)
VL48 ($33)
Savcho Savchev ($30)
Josue W ($15)
Reyna Cruz ($15)
Tyler Thompson ($3)
Tam Van Phan ($8,4)
MR D CRANSON ($25)
Gilberto Lozada ($15)
Keith Young ($45)
Zee Bee ($11)
Kevin Borges ($50) root bounty at gofundme.com
Catalin Oprea (+$50) root bounty at gofundme.com
Luke Miller ($50) root bounty at gofundme.com
@AngryManMLS ($20)
@Shtiff1 ($20)
Thank you very much to all who donated or are about to donate.
DOWNLOAD
MAGISK SETUP FROM TEMP ROOT WITH LOCKED BOOTLOADER
To enjoy the temporal root with apps asking for root permission, you can now start magisk v20.4 from the root shell provided by the exploit.
download the v50g8-mroot3.zip with the exploit attached in the first post
download Magisk-v20.4.zip from magisk releases page on github here
use 'adb push v50g8-mroot3.zip Magisk-v20.4.zip /data/local/tmp' to copy the zips to the phone
unzip and prepare magisk setup with following commands in 'adb shell'
Code:
cd /data/local/tmp
unzip v50g8-mroot3.zip
chmod 755 v50g8-mroot3 magisk-setup.sh magisk-start.sh
./magisk-setup.sh
get temp root and start magisk up with following commands in 'adb shell':
Code:
cd /data/local/tmp
./v50g8-mroot3
./magisk-start.sh -1
./magisk-start.sh -2
./magisk-start.sh -3
just this point should be done after each reboot to get magisk running again.
NOTE: please be sure to enter each command separately, line after line - do not paste all in a single block and do not put them in a script.
There are reasons this is divided in 3 stages. With this approach I got the best stability, while putting ./v50g8-mroot3 together with -1 and/or -2 stuff in a single script run resulted with a reboot most of the time.
Phases 2 and 3 need to be split for functional reasons to start magisk with working su permission asking notification.
If it worked, you should see something like this:
Code:
flashlmdd:/ $ cd /data/local/tmp
flashlmdd:/data/local/tmp $ ./v50g8-mroot3
[+] factoryversion = LMV500NAT-00-V20m-LAO-COM-MAR-10-2020+0
[+] Mapped 200000
[+] selinux_enforcing before exploit: 1
[+] pipe file: 0xffffffd07822fa00
[+] file epitem at ffffffd102da6d00
[+] Reallocating content of 'write8_inode' with controlled data...............[DONE]
[+] Overwriting 0xffffffd07822fa20 with 0xffffffd102da6d50...[DONE]
[+] Write done, should have arbitrary read now.
[+] file operations: ffffff9dee01ebf8
[+] kernel base: ffffff9dece80000
[+] Reallocating content of 'write8_selinux' with controlled data..[DONE]
[+] Overwriting 0xffffff9def290000 with 0x0...[DONE]
[+] init_cred: ffffff9def02fcd0
[+] memstart_addr: 0xfffffff040000000
[+] First level entry: ae7f6003 -> next table at ffffffd06e7f6000
[+] Second level entry: ae419003 -> next table at ffffffd06e419000
[+] sysctl_table_root = ffffff9def05c710
[+] Reallocating content of 'write8_sysctl' with controlled data.......[DONE]
[+] Overwriting 0xffffffd1316fc268 with 0xffffffd0ba748000...[DONE]
[+] Injected sysctl node!
[+] Node write8_inode, pid 7109, kaddr ffffffd0c1193700
[+] Replaced sendmmsg dangling reference
[+] Replaced sendmmsg dangling reference
[+] Replaced sendmmsg dangling reference
[+] Node write8_selinux, pid 6726, kaddr ffffffd08bfeb400
[+] Replaced sendmmsg dangling reference
[+] Replaced sendmmsg dangling reference
[+] Replaced sendmmsg dangling reference
[+] Node write8_sysctl, pid 6772, kaddr ffffffd0afc0d000
[+] Replaced sendmmsg dangling reference
[+] Replaced sendmmsg dangling reference
[+] Replaced sendmmsg dangling reference
[+] Cleaned up sendmsg threads
[+] epitem.next = ffffffd07822fa20
[+] epitem.prev = ffffffd07822fad8
[+] Launching privileged shell
root_by_cve-2020-0041:/data/local/tmp # ./magisk-start.sh -1
+ FRESH=false
+ '[' -1 '=' --fresh ']'
+ '[' ! -e /data/adb/magisk/busybox ']'
+ ./magiskpolicy --live --magisk 'allow dumpstate * * *'
Load policy from: /sys/fs/selinux/policy
root_by_cve-2020-0041:/data/local/tmp # ./magisk-start.sh -2
+ FRESH=false
+ '[' -2 '=' --fresh ']'
+ '[' ! -e /data/adb/magisk/busybox ']'
+ STAGE=2
+ '[' 2 '=' 2 ']'
+ mount -t tmpfs -o 'mode=755' none /sbin
+ chcon u:object_r:rootfs:s0 /sbin
+ chmod 755 /sbin
+ cp -a magisk/boot_patch.sh /sbin
+ cp -a magisk/magiskboot /sbin
+ cp -a magisk/magiskinit64 /sbin
+ cp -a magisk/busybox /sbin
+ cp -a magisk/util_functions.sh /sbin
+ cd /sbin
+ chmod 755 boot_patch.sh busybox magiskboot magiskinit64 util_functions.sh
+ mkdir r
+ mount -o bind / r
+ cp -a r/sbin/. /sbin
+ umount r
+ rmdir r
+ mv magiskinit64 magiskinit
+ ./magiskinit -x magisk magisk
+ ln -s /sbin/magiskinit /sbin/magiskpolicy
+ ln -s /sbin/magiskinit /sbin/supolicy
+ false
+ chcon -R u:object_r:magisk_file:s0 /data/adb/magisk
+ rm -f magiskboot util_functions.sh boot_patch.sh
+ ln -s /sbin/magisk /sbin/su
+ ln -s /sbin/magisk /sbin/resetprop
+ ln -s /sbin/magisk /sbin/magiskhide
+ mkdir /sbin/.magisk
+ chmod 755 /sbin/.magisk
+ >/sbin/.magisk/config
+ echo 'KEEPVERITY=true'
+ >>/sbin/.magisk/config
+ echo 'KEEPFORCEENCRYPT=true'
+ chmod 000 /sbin/.magisk/config
+ mkdir -p /sbin/.magisk/busybox
+ chmod 755 /sbin/.magisk/busybox
+ mv busybox /sbin/.magisk/busybox
+ mkdir -p /sbin/.magisk/mirror
+ chmod 000 /sbin/.magisk/mirror
+ mkdir -p /sbin/.magisk/block
+ chmod 000 /sbin/.magisk/block
+ mkdir -p /sbin/.magisk/modules
+ chmod 755 /sbin/.magisk/modules
+ mkdir -p /data/adb/modules
+ chmod 755 /data/adb/modules
+ mkdir -p /data/adb/post-fs-data.d
+ chmod 755 /data/adb/post-fs-data.d
+ mkdir -p /data/adb/service.d
+ chmod 755 /data/adb/service.d
+ chcon -R -h u:object_r:rootfs:s0 /sbin/.magisk
+ chcon u:object_r:magisk_file:s0 /sbin/.magisk/busybox/busybox
+ /sbin/magisk --daemon
client: launching new main daemon process
+ pidof magiskd
+ MP=14148
+ '[' -z 14148 ']'
+ >/sbin/.magisk/escalate
+ echo 14148
+ '[' -e /sbin/.magisk/escalate ']'
+ sleep 1
+ '[' -e /sbin/.magisk/escalate ']'
root_by_cve-2020-0041:/data/local/tmp # ./magisk-start.sh -3
+ FRESH=false
+ '[' -3 '=' --fresh ']'
+ '[' ! -e /data/adb/magisk/busybox ']'
+ STAGE=3
+ '[' 3 '=' 2 ']'
+ >/sbin/.magisk/magiskd
+ echo -e '#!/system/bin/sh\n/sbin/magisk --daemon'
+ chmod 755 /sbin/.magisk/magiskd
+ chcon u:object_r:dumpstate_exec:s0 /sbin/.magisk/magiskd
+ getprop init.svc.dumpstate
+ SVC=''
+ timeout=10
+ '[' 10 -gt 0 ']'
+ stop dumpstate
+ killall -9 magiskd
+ stop dumpstate
+ mount -o bind /sbin/.magisk/magiskd /system/bin/dumpstate
+ start dumpstate
+ timeout=10
+ '[' 10 -le 0 ']'
+ pidof magiskd
+ MP=14165
+ '[' -n 14165 ']'
+ break
+ stop dumpstate
+ sleep 1
+ umount /system/bin/dumpstate
+ rm -f /sbin/.magisk/magiskd
+ '[' '' '=' running ']'
+ rm -f /dev/.magisk_unblock
+ /sbin/magisk --post-fs-data
+ timeout=10
+ '[' -e /dev/.magisk_unblock -o 10 -le 0 ']'
+ sleep 1
+ timeout=9
+ '[' -e /dev/.magisk_unblock -o 9 -le 0 ']'
+ /sbin/magisk --service
+ sleep 1
+ /sbin/magisk --boot-complete
+ chmod 751 /sbin
root_by_cve-2020-0041:/data/local/tmp # id
uid=0(root) gid=0(root) groups=0(root),1004(input),1007(log),1011(adb),1015(sdcard_rw),1028(sdcard_r),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats),3009(readproc),3011(uhid) context=u:r:magisk:s0
root_by_cve-2020-0041:/data/local/tmp # uname -a
Linux localhost 4.14.117-perf #1 SMP PREEMPT Tue Mar 10 18:44:38 KST 2020 aarch64
root_by_cve-2020-0041:/data/local/tmp # getenforce
Permissive
Now you can exit the temp root shell and use 'su' to get a root shell controlled by magisk manager or allow other apps that need root as asking for root permission now works.
You can even re-enable selinux like this from 'adb shell':
Code:
su -c 'setenforce 1'
The magisk setup from exploit including working permission asking has been fully developed by me, it uses some novel techniques to overcome the limitations caused by magisk run from a temp root instead of being integrated in boot process as a service.
TIPS FOR BETTER STABILITY OF THE EXPLOIT
The exploit works based on use after free, that means it depends on state of memory heap and how it changes during exploit time.
That means there is some portion of unpredictability and a chance that something else is overwritten than hoped for by shaping the heap.
So to get best results, one should stop anything that could run in background, like:
set airplain mode, turn off wifi and bluetooth so there is no data connection at all
set "Stay awake" to ON while charging (i.e. using adb shell) in developer options
disable auto updates of system and apps
debloat your system so useless apps do not run in background
reboot your phone having all the above
wait two minutes after boot up with phone unlocked, screen on connected to PC via usb cable having 'adb shell' already active (checking with 'uptime' command)
start the exploit
after getting root shell and succesfuly starting magisk, do not forget to properly exit the temp root shell by use of 'exit' command two times, so the 'adb shell' with the exploit is ended with the rest of clean up
CHANGELOG
2020-05-11 : Initial release (V500N20m-testJ) supporting V500N20m all Korean variants
2020-05-16 : multiple targets supported (v50g8-root)
2020-05-20 : v50g8-dump tool to dump kernel space memory available in G8 thread
2020-05-24 : implemented support for magisk start from the exploit (v50g8-mroot), added support for V50 Sprint with 2020-01-01 security patch level
2020-06-10 : fixed problem when V50 rebooted/crashed soon after obtaining temp root shell, released as v50g8-mroot2
2020-06-23 : hopefully stability improved even more with V50 allowing stable magisk start from temp root, released as v50g8-mroot3
Ok guys, OK!!!!
Here is a guide made for noobs for Root (download, extract and copy root file inside platform tools folder) and Backup in it, using Adb Platform Tools
Root and Backup V50 Korea
1. Download LG V50 Root (extract it and copy inside platform tools folder), Platform Tools ADB and LG USB Drivers 4.4.2 and install it
https://forum.xda-developers.com/v5...g-v50-temp-root-exploit-via-cve-2020-t4098077
https://www.mediafire.com/file/mu78ydkoalgfzyd/platform_tools_adb.zip/file
http://tool.lime.gdms.lge.com/dn/downloader.dev?fileKey=UW00120120425
2. Connect USB then Enable Developer Options and USB Debugging and enable Stay Awake Screen
3. Turn off wifi, data, bluetooth restart phone, unlock screen and let it 1 minute to load all processes
4. Run Power shell command from inside platform tools folder (SHIFT+right mouse and open power shell here) and type cmd and hit enter
5. Run command - adb devices - a pupup should appear on your phone - tap Allow and Remember it on your phone!
6. Run one by one the following commands
adb push V500N20m-testJ /data/local/tmp
adb shell
cd /data/local/tmp
chmod 755 ./V500N20m-testJ
./V500N20m-testJ
7. When rooted you will have this lines in terminal
[*] Launching privileged shell
root_by_cve-2020-0041:/data/local/tmp #
If root is not achieved or phone restarts by itself repeat from step 3
Backup Important non KDZ Stuff like IMEI
1. Download this file backupselected.sh and move it inside your adb program This is already pushed to Platform Tools folder so ignore it
https://www.mediafire.com/file/gh00t76n4ctc061/backupselected.sh/file
2. Run this command from cmd
adb push backupselected.sh /data/local/tmp
3. Obtain Temp Root and from root shell run these
chmod -R 777 /data/local/tmp
./backupselected.sh
4. Backup will be saved in Download folder on your phone
Usefull Commands - Maybe @j4nn can help us with more usefull commands
rm *.* - delete all files
rm -rf (folder name) - delete that folder
adb push (folder or file name) /data/local/tmp - copy that folder or file name to that /data/local/tmp address
cd /data/local/tmp - then - pm install (appname) - installs it
Thank you. Can't wait for the G8 root guide!
Excellent someday we will have the Bootloader unlocked and for being to install the R
ags
j4nn said:
temp root exploit for LG V50 ThinQ with android 10 firmware​
...................................................................Mod Edit: Removed bulk of unnecessarily quoted OP.........................................................
Thank you very much to all who donated or are about to donate.
DOWNLOAD
Click to expand...
Click to collapse
Mod Edit: Please DO NOT quote the entire OP. Either use HIDE tags or trim the quote as I did. Thank you.
Awesome patiently waiting for spring g8 to be compatable.
Received 150 USD to my paypal from Kevin Borges with following comment:
KanBorges said:
Thank you so much for your work. This is all the money in the bounty I set up on Gofundme. com. My username in XDA is @KanBorges . Again, thank you! Hopefully you can get twrp/magisk soon.
Click to expand...
Click to collapse
Thank you and all other contributors for the donations.
I've updated the first post (not only the donations list but added some more clarifications too).
Please note, as discussed since beginning with @Inerent, only the temp root exploit has been supposed to be implemented by me.
There is however available an engineering booloader, that may eventually allow to unlock bootloader after flashing from temp root.
This needs to be tested first and can involve some risks to brick the phone.
I do not own any LG phone (and do not even want one), so I am not doing that, sorry.
But I've already checked few things regarding the engineering bootloader and I can conclude, that it could be compatible in the sense that it most likely would not brick the device.
The reason I see that comparing stock firmware ABL image and the eng bootloader (aka ABL) seems that both use the same signing root certificate and they both have identical OU info in the signature certificate:
Code:
OU=07 0001 SHA256,
OU=06 0000 MODEL_ID,
OU=05 00000000 SW_SIZE,
OU=04 0031 OEM_ID,
OU=03 0000000000000001 DEBUG,
OU=02 000A50E100310000 HW_ID,
OU=01 000000000000001C SW_ID
If it would work with android 10 is another question though.
Please find attached source for split utility, to get some parts of the image likely to start with a signature certificate.
Those parts then can be converted to text form representation of the certificate via following command for example:
Code:
openssl x509 -in LUN4_abl_a_COM3.img-001238 -inform der -text -noout > LUN4_abl_a_COM3.img-001238.txt
Yes, Jann, thats true. But thx for helping us with some advices. I hope we are a big community (also users are coming from LG v30 and V40) and will figure this out, or rise another bounty if not.
Thx for helping us!
$20 donation sent to @j4nn from me. Thanks for the hard work.
@AngryManMLS, thank you for the donation. Updated the first post.
LG G8
Inerent said:
It seems this lg g820UM is the code for all USA carriers and Canada and should work for all like for koreans
If you do March root it will be compatible with February or January? If yes then pick March firmware.
Firmwares here.:
https://lg-firmwares.com/lg-lmg820um-firmwares/
Click to expand...
Click to collapse
Please note, if the exploit works with March firmware, it does not make it compatible with any other older firmwares, even if they are vulnerable.
The kernel build (binary image) is different there, i.e. it would need different offsets in the exploit to succeed.
The reason for selecting March security patch level with LG V50, i.e. the V500N20m firmware version, has been in order to exploit the newest still exploitable firmware.
The bug has been fixed in LG kernel since April security patch level, so using March fw allows you to use the latest still vulnerable and the most up to date fw for the temp root.
For other targets like the G8 might be useful to select other fw version if there are multiple variants that would use identical kernel binary image, possibly even not having a downloadable fw release for a variant, while existing for another variant (this may be a case if phone variants have identical or nearly the same hw).
j4nn said:
For other targets like the G8 might be useful to select other fw version if there are multiple variants that would use identical kernel binary image, possibly even not having a downloadable fw release for a variant, while existing for another variant (this may be a case if phone variants have identical or nearly the same hw).
Click to expand...
Click to collapse
The difficult thing is that the G8 variants are all over the place with which firmware/security patch they are on. My T-Mobile variant (G820TM) is on January 2020 meanwhile say the Verizon variant (G820UM) is on February 2020. So it's a mess which pretty much tells me each variant will need to have it's own exploit made for it.
Edit: Just found out the G820UM just got the April security update. KDZ isn't out yet for that.
j4nn said:
Please note, if the exploit works with March firmware, it does not make it compatible with any other older firmwares, even if they are vulnerable.
The kernel build (binary image) is different there, i.e. it would need different offsets in the exploit to succeed.
The reason for selecting March security patch level with LG V50, i.e. the V500N20m firmware version, has been in order to exploit the newest still exploitable firmware.
The bug has been fixed in LG kernel since April security patch level, so using March fw allows you to use the latest still vulnerable and the most up to date fw for the temp root.
For other targets like the G8 might be useful to select other fw version if there are multiple variants that would use identical kernel binary image, possibly even not having a downloadable fw release for a variant, while existing for another variant (this may be a case if phone variants have identical or nearly the same hw).
Click to expand...
Click to collapse
Hello, I've been talking to inherent on telegram; I think he sent you some of my outputs / logs. I'm sorry I haven't been able to donate as I'm unfortunately not old enough to do so. I've got a Sprint g8 which is stuck on the Android 10 beta on November patch. If you adapt this for other g820um variants, will it likely work with my patch or not?
@AngryManMLS, most likely April security fixed the bug making it not exploitable anymore.
Yes, each kernel build/image would need specific support in the exploit.
@antintin, I need the binary image of kernel used in the firmware that is running the phone we would target with the temp root exploit in order to develop support for it.
Is your Android 10 beta on November patch firmware downloadable anywhere?
Or can you flash any other firmware?
Can you say which G8 model/carrier would have identical hardware to your Sprint G8, while having a downloadable fw?
j4nn said:
@AngryManMLS, most likely April security fixed the bug making it not exploitable anymore.
Yes, each kernel build/image would need specific support in the exploit.
@antintin, I need the binary image of kernel used in the firmware that is running the phone we would target with the temp root exploit in order to develop support for it.
Is your Android 10 beta on November patch firmware downloadable anywhere?
Or can you flash any other firmware?
Can you say which G8 model/carrier would have identical hardware to your Sprint G8, while having a downloadable fw?
Click to expand...
Click to collapse
Well I'm not entirely certain, maybe I can ask vl48. I think any g820um should be fine though. I doubt there is any beta kdz available to download, however. I unfortunately can only go on the final pie version or November patch beta 10 on my Sprint. My updates are broken :
After the temp root, can we flash Magisk patched boot img to /dev/block/bootdevice/by-name/boot_a or something like that? Does it still work after a reboot
@quantan, most likely not, due to dm-verity/AVB 2.0 - it is a temp root...
Magisk (with possibly limited functionality) may be eventually started from the exploit, but it seems not to work yet...
Would be good to at least have android 10 on the Australian V50 but we can't even get that.
Will never buy lg again.
snake65 said:
Would be good to at least have android 10 on the Australian V50 but we can't even get that.
Will never buy lg again.
Click to expand...
Click to collapse
That is not LG fault, is your carrier one. Wait patiently, pretty soon all our problems are resolved.
snake65 said:
Would be good to at least have android 10 on the Australian V50 but we can't even get that.
Will never buy lg again.
Click to expand...
Click to collapse
I have to agree with you on this one. Right now, LG is getting it's lunch eaten by many Chinese OEMs and their bleeding cash in the smartphone business. LG latest "FLAGSHIP", the V60, is a d*** joke when comparing it's 60Hz screen refresh rate to any new smartphone. It's selling for $809.99 new on Tmob and their already selling for less than $700 on Ebay. By end of summer, $390?
I too "Will never buy LG again!".
BTW, I have an Essential PH-1, admittedly old hardware but I'm already running Android 11 DP4 as a daily with very few problems. The V50 won't see 11 for what....... 18 months?

[HELP] Sertificate problem

I'm trying to mod SHM on watch for adding rus language and trying to replace some files, but actually SDB write "security error"
After using Sertifier, sdb write "sertificate error[-14]"
Code:
-14
No additional info spit out from SDB?
I ever forgott the ...
If you choose KOO for Korea... then SHM is preinstalled...
Maybe you then need first to uninstall complete to use own Cert...
And other apps you can resign and work?
https://forum.xda-developers.com/smartwatch/gear-fit/howto-sign-sideload-tizen-applications-t3639793
Best Regards
Edit 1.
On older Versions short tried and possible... example with German text:
https://forum.xda-developers.com/showpost.php?p=82823051&postcount=665
Hm, no, i use XAR, there not preinstalled
Yes, i'm actually used sertifier from Fit2installer and it wrote an [-14] error
But thanks
About other apps soon check
And you uninstall Original TPK before... because Certs now differ...
You can look here for uninstall Commands via SDB:
https://forum.xda-developers.com/showpost.php?p=83327589&postcount=1726
I mean this:
Code:
pkgcmd -u -t tpk -n com.samsung.health.samd.bp
To be sure the old TPK with different Cert is removed from SQLite Database...
Maybe now I remember what -14 is...
IMHO this could be you trying with public Cert Privilege Level to sign Platform crap...
Remove the .admin line in manifest.xml
Again.
SDB sometimes talk to you...
There is more text visible as -14
Best Regards
Edit 1.
Here is you output for -14
https://forum.xda-developers.com/showpost.php?p=83275933&postcount=1620
Code:
__return_cb req_id[1] pkg_type[tpk] pkgid[com.samsung.health.samd.bp] key[error] val[-14] error message: :Check tizen-manifest.xml| - Current api-version = 4.0.0.8, | certificate signature level = partner||[MISMATCHED_PRIVILEGE_LEVEL]| - http://tizen.org/privilege/packagemanager.admin| >> [B][COLOR="Red"]Use at least platform signatured certificate[/COLOR][/B].||:<-7>
__return_cb req_id[1] pkg_type[tpk] pkgid[com.samsung.health.samd.bp] key[end] val[fail]
processing result : Signature error [-14] failed
Remove this from Manifest... and you can use Public Level Cert...
Code:
http://tizen.org/privilege/packagemanager[B][COLOR="Red"].admin[/COLOR][/B]
Thank you very much! It's really work, and now i compile and sign a tpk, but now...idk, but file home.mo has a multiple encode, and how to decode.. idk
But thank you
If I have time I will check, what I can do...
My old tests only with older TPKs... so maybe something changed...
Best Regards
adfree said:
If I have time I will check, what I can do...
Click to expand...
Click to collapse
Thanks, i'm translate it. It's needed only file mo convert to po and then edit.
But then...it's application starts only on my watch, but all others people has error [-12]
...but all others people has error [-12]
Click to expand...
Click to collapse
Yes. This is normal... because Cert is only valid for your own device... DUID Check...
Thanx to Samsu.g...
To bypass this problem at the moment 2 wayS...
A
User have to sign with own Certificate...
B
Rooted and/or modified Firmware... :angel:
This is what I used...
I can use Samsung Certs for all 3 Privilege Levels...
Code:
Public
Partner
Platform
"Bad"... at the moment not tested with GWA2...
Need brave tester... :angel:
Best Regards
adfree said:
Yes. This is normal... because Cert is only valid for your own device... DUID Check...
Thanx to Samsu.g...
To bypass this problem at the moment 2 wayS...
Rooted and/or modified Firmware..
Click to expand...
Click to collapse
Oh...that's bad, and now only root users may to flash my mod?
Alyway thank you
Oh...that's bad, and now only root users may to flash my mod?
Click to expand...
Click to collapse
At the moment nobody else can use your work, without resign.
Your own Certs... your own Signatures...
They are not inside Firmware.
My way is to use Samsung Certs...
They are inside for instance Combination Firmware...
IMHO 5 years old or maybe meanwhile older...
It is for instance possible to create Certs for few more devices... IMHO DUID crap...
Something like register blabla few more devices...
Sorry, this is the Security crap of Samsu.g...
They want protect Watch Faces...
Best Regards
Sorry, at the moment less time...
My plan for this month...
Root SM-R820.
At the moment I have only BTF3 Firmware Files... not the latest BTG1...
Anyway... need more time.
Best Regards
Done. :angel:
SM-R820 BTF3 Root work.
https://forum.xda-developers.com/showpost.php?p=83433641&postcount=1851
I have no BTG1 files... otherwise I would root here rootfs.img...
If I have time I will play with TPK...
Maybe German text...
Will try other Animation or remove or...
Best Regards
Rooted also SM-R830...
And as example...
https://forum.xda-developers.com/showpost.php?p=83458777&postcount=926
In these RPMs Samsu.g Certs inside...
Best Regards
Because Samsu.g seems have no plan to expand SHM to more countries... in near future...
I mean 2020...
I will spend again some time with languages...
Code:
august_BPandECG_combo_version23_PlatformSigned_mod1.tpk
Will concentrate on latest known... "29"...
Code:
september_BPandECG_combo_version29_PlatformSigned_mod1.tpk
29 have 1 more language... Portugues for Brasil...
Still I have not understand if easily I can add folder + file...
Code:
DE
Need some time to understand...
Best Regards
Edit 1.
SHM 29 TPK not configured... not paired with Phone...
IMHO this is good start... text string:
Code:
Download the app
Can be found in 2 files...
Code:
\res\locale\[B]default[/B]\LC_MESSAGES\home.mo
\res\locale\[B]en_US[/B]\LC_MESSAGES\home.mo
1:1 same content...
Hmmmmmmmmmmmmmmmmmmmmmmmmmmm....
Can I simple add folder:
Code:
de_DE
Edit 2.
Hey cool... this is working... my folder de_DE
Now doing some time cunuming thing.. to translate I find correct position...
Example...
2 times:
Code:
Download the app
First for ECG... Second for BP...
2 times:
Code:
Blood pressure
Found first... but not the second...
Change into:
Code:
Blutdruck 1
Blutdruck 2
So I can see what where is used...
Tiny Example about my German """Translation"""...
Only as "Tech Demo"...
German Umlaut not work yet...
Best Regards

Categories

Resources