Closed frostworx closed 1 year ago
@viraniac I'll provide you the requested data as soon as the device boots again. It refuses to do anything since I closed it just right now, sorry :)
@viraniac I'll provide you the requested data as soon as the device boots again. It refuses to do anything since I closed it just right now, sorry :)
you are using mtkclient to boot right? Once rooted, device will never boot without it until you restore or update it. Updating will unroot the device
@viraniac I'll provide you the requested data as soon as the device boots again. It refuses to do anything since I closed it just right now, sorry :)
you are using mtkclient to boot right? Once rooted, device will never boot without it
yes, plug the device in while holding the "dot" button, then run
mtk plstage --preloader=preloader_no_hdr.bin
(which seems to work)
then wait for some light and/or adb device which both don't appear.
It worked twice before I closed the device, so I assume reopening it again is a good next step :)
No need to hold dot button now. Its only required if you want to start it into fastboot mode. Thats what we use to set fos_flags
just run mtk plstage --preloader=preloader_no_hdr.bin
and plug the device it will boot
oh sorry, good to know
anyway the problem likely simply was that I overwrote your preloader_no_hdr.bin
while attempting to root my 2nd dot device... sorry for the noise
makes sense. I haven't deleted that file yet, you can redownload from the previously shared link
thanks, I kept a backup though :)
adb works fine now, but my system seems to be a bit limited.
there is no strings
or find
for example.
just pulling /dev/block/mmcblk0p16
, which is the device node
/dev/block/platform/mtk-msdc.0/by-name
using adb pull, no idea if this is meant to be successful, as it already has 1gb.
if it works, I'll get your string from the copy.
grep version.name /system/*.prop
returns
ro.build.version.name=Fire OS 5.5.5.4 (680766420)
Interesting. So the version I suggested yesterday for the preloader for restoration is your actual version. Thats a nice coincidence :)
before I paste the whole stdout, should I worry about publishing any possible device specific data returned by the grep?
I guess the 1s31zyz7dcc2d.cloudfront.net
urls returned are already known anyway, right? :)
before I paste the whole stdout, should I worry about publishing any possible device specific data returned by the grep?
you can clean it up if you want and only share the urls.
I guess the
1s31zyz7dcc2d.cloudfront.net
urls returned are already known anyway, right? :)
Depends on how they end. the interesting bit is not domain name what comes after
thanks for your patience :)
here we go:
# strings mmcblk0p16 | grep "https.*.biscuit" | sort -u
0https://d1s31zyz7dcc2d.cloudfront.prod.ota-cloudfront.net/47a1457e0802980eb32f63cd3ce355c0/update-kindle-csm_biscuit-272.6.8.0_user_680767620.bin{"binaryType":"full","md5Sum":"805e721e1bed461d8a81015a1f703fc1","remoteFileSize":"396710733","sha256":"6ababc517529938f0d1e836c3410a91df19683ae62d7fca9e2ca57320d5d2faa"}
https://d1s31zyz7dcc2d.cloudfront.net/60556d35239d902637f0fc503411b791/update-kindle-csm_biscuit-272.6.7.2_user_672720020.bin/cache/update-kindle-csm_biscuit-272.6.7.2_user_672720020.binbinary/octet-stream
https://d1s31zyz7dcc2d.cloudfront.prod.ota-cloudfront.net/47a1457e0802980eb32f63cd3ce355c0/update-kindle-csm_biscuit-272.6.8.0_user_680767620.bin
https://d1s31zyz7dcc2d.cloudfront.prod.ota-cloudfront.net/47a1457e0802980eb32f63cd3ce355c0/update-kindle-csm_biscuit-272.6.8.0_user_680767620.bin/cache/update-kindle-csm_biscuit-272.6.8.0_user_680767620.binbinary/octet-stream
please let me know if you require anything else!
edit: I thought you might have the urls already, because you already have the 5.5.5.4 url
This seems new https://d1s31zyz7dcc2d.cloudfront.net/60556d35239d902637f0fc503411b791/update-kindle-csm_biscuit-272.6.7.2_user_672720020.bin
The other one is just 5.5.5.4
nice, I'll provide the same data for the other device, as soon as I have root access
yay, I have a version from my 2nd new dot:
root@biscuit:/ # grep version.name /system/*.prop
ro.build.version.name=Fire OS 5.5.2.1 (601481420)
strings mmcblk0p16 | grep "http.*.biscuit" | sort -u
doesn't have any match though. is there anything else which might be interesting?
what all strings you get that start with http:// or https:// ?
I knew you asked this :) here we go:
# strings mmcblk0p16 | grep "http:\|https:" | sort -u
<a href="http://download.oracle.com/javase/6/docs/api/java/util/zip/CRC32.html">CRC-32 Documentation</a>
<class value="AuthenticatedDeviceGetUpdatesQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
<class value="BaseInstalledSoftwareComponentDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
<class value="DeviceInstalledSoftwareComponentDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
<class value="GetSoftwareComponentDetailsForOtaGroupInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
<class value="PaginatedSoftwareComponentDetailsForOtaGroup:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
<class value="SoftwareComponentDependenciesContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
<class value="SoftwareComponentVersionCodeContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
<class value="SoftwareComponentVersionListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
<class value="UnauthenticatedDeviceGetUpdatesQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
<class value="UnauthenticatedDeviceTypeListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
https://w.amazon.com/index.php/DevicePlatform/DeviceRegistry
https://w.amazon.com/index.php/Digital/Delivery/Messaging/Authentication
https://w.amazon.com/index.php/Digital/Delivery/Messaging/FAQ#How_unique_do_message_IDs_have_to_be_on_the_device.3F
https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Delivery_Options
https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Endpoint
https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Message
https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Message_Metadata
https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Response
https://w.amazon.com/index.php/Digital/Delivery/Messaging/Interface#Status_Codes
https://w.amazon.com/index.php/Digital/Delivery/Messaging/TransportProtocols/WebServiceHTTP#Response_2
https://w.amazon.com/index.php?title=IdentityServices/DirectedIDs
http://specs.openid.net/auth/2.0
!https://det-ta-g7g.amazon.com:443
!sdcdurl.cde.tahttps://cde-ta-g7g.amazon.com/FionaCDEServiceEngine>
#9dcdurl.websitehttps://www.amazon.com7
#]dcdurl.firs.tahttps://firs-ta-g7g.amazon.com/FirsProxy4
#odcdurl.todo.tahttps://todo-ta-g7g.amazon.com/FionaTodoListProxy=
$http://d3h5bk8iotgjvw.cloudfront.net
$http://www.amazon.com/ap/ext/oauth/2
$https://api.amazon.com/auth/O2/token
$https://dp-mont.integ.amazon.com:443
%9dcdurl.wsync.v2https://api.amazon.com)
%odcdurl.kdk.subshttps://kdk-ws.amazon.com/SubscriptionStatusProxy.
&https://identity-snds.amazon.com/snds/
'http://clients3.google.com/generate_204
'https://android.googleapis.com/gcm/send
'https://det-ta-g7g.integ.amazon.com:443
(https://device-metrics-us.amazon.com:443
)9dcdurl.panda.prodhttps://api.amazon.com6
)Edcdurl.panda.betahttps://api.integ.amazon.comH
)idcdurl.det.unauthhttps://det-ta-g7g.amazon.com/DeviceEventProxy
*https://det-ta-g7g.vipinteg.amazon.com:443
*https://device-metrics-us-2.amazon.com:443
+http://specs.openid.net/extensions/pape/1.0
,http://www.amazon.com/workAroundDcpBlackList
,https://devicemessaging.us-east-1.amazon.com
-]dcdurl.firs.ta.prodhttps://firs-ta-g7g.amazon.com/FirsProxyJ
-idcdurl.firs.ta.betahttps://firs-ta-g7g.integ.amazon.com/FirsProxy-
-odcdurl.todo.ta.prodhttps://todo-ta-g7g.amazon.com/FionaTodoListProxyS
-{dcdurl.todo.ta.betahttps://todo-ta-g7g.integ.amazon.com/FionaTodoListProxy?
/Idcdurl.panda.preprodhttps://api-preprod.amazon.com1
/adcdurl.facebook.authhttps://api.facebook.com/method/auth.loginI
1Ydcdurl.messaging.posthttps://device-messaging-na.amazon.comD
2http://specs.openid.net/auth/2.0/identifier_select
2https://device-messaging-na.amazon.com/GetMessages
2https://graph.facebook.com/oauth/access_token_info
3mdcdurl.firs.ta.preprodhttps://firs-ta-g7g-preprod.amazon.com/FirsProxyE
5dcdurl.dcas.pfmhttps://dcape-na.amazon.com/getCustomerAttribute?version=1_0;preferences=$PREFERENCEB
5https://devicemessaging.us-east-1.amazon.com/messages
5odcddmld.dms.endpointURLhttps://device-metrics-us.amazon.com/metricsBatch7
6https://softwareupdates.amazon.com/software/inventory2
7http://www.amazon.com/ap/specs/auth/confirm_credentials
7https://updates.amazon.com/software/inventory/companion
8http://internal.amazon.com/coral/com.amazon.whisperpush/
8https://api.facebook.com/method/auth.authorizeproxiedapp
9See also http://www.slf4j.org/codes.html#substituteLogger
9dcdurl.odachttps://www.amazon.com
9dcdurl.pandahttps://api.amazon.com)
:https://todo-ta-g7g.amazon.com/FionaTodoListProxy/getItems
<https://api.facebook.com/method/auth.grantextendedpermission
=adcdurl.twitter.access.tokenhttps://api.twitter.com/oauth/access_token1
>http://internal.amazon.com/coral/com.amazon.whisperpush.types/
>https://%s:443/dfu/sign/v1?deviceSerialNumber=%s&deviceType=%s
Adcdurl.grokhttps://kca.amazon.com/kca4
Ahttps://api.facebook.com/method/permissions.getandroiddescription
Bhttp://internal.amazon.com/coral/com.amazon.devicemessaging.types/
Chttp://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/
Dhttps://w.amazon.com/index.php/DigitalSecurity/CertificatePinningFAQ
Ehttp://internal.amazon.com/coral/com.amazon.devicemessaging.protocol/
Ghttps://w.amazon.com/index.php/IdentityServices/PandaService/Onboarding
ISee http://www.slf4j.org/codes.html#loggerNameMismatch for an explanation
ISee http://www.slf4j.org/codes.html#multiple_bindings for an explanation.
ISee http://www.slf4j.org/codes.html#version_mismatch for further details.
KSee http://www.slf4j.org/codes.html#StaticLoggerBinder for further details.
M(https:\/\/|http:\/\/)?(z\.cn|amzn\.asia|a\.co|amzn\.co|amzn\.eu)\/\S*#verify
Mdcdurl.mysnhttps://kindle.amazon.com/socialg
URL does not use https:
URL does not use https: %s
UTF-8 is not supported. This should not happen according to http://developer.android.com/reference/java/nio/charset/Charset.html
Udcdurl.emberhttps://www.amazon.com/gp/ember/xyml?
Wdcdurl.firshttps://firs-g7g.amazon.com/FirsProxyD
Wdcdurl.sndshttps://identity-snds.amazon.com/snds/
ZSee https://w.amazon.com/index.php/IdentityServices/Mobile/DevoPreprodProdSwitch/UserGuide
] <namespace value="http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
accessibility_script_injection_urlhttps://ssl.gstatic.com/accessibility/javascript/android/AndroidVox_v1.js
b <class value="DeviceId:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
c <class value="Inventory:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
cdcdurl.dethttps://det-g7g.amazon.com/DeviceEventProxyC
d <class value="UpdatePath:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
dcdurl.dcas.timezonehttps://dcape-na.amazon.com/getCustomerTimezone?version=1_0h
dcdurl.todo.ta.preprodhttps://todo-ta-g7g-preprod.amazon.com/FionaTodoListProxyN
dcdwifid.captiveportal.proto.cnhttp://>
dcdwifid.captiveportal.protohttp://:
e <class value="OtaGroupKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
f <class value="UpdateBinary:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
g <class value="CallerDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
g <class value="DeviceDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
g <class value="OfferedUpdate:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
g <class value="UpdatePathKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
gCheck https://w.amazon.com/index.php/IdentityServices/Mobile/DevoPreprodProdSwitch/UserGuide for detail
http://
http://prod.amazoncrl.com
https://
https://(.*)\.amazon\.[^/]+
https://api.amazon.com
https://arcus-uswest.amazon.com
https://www
i <class value="DeviceInventory:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
i <class value="UpdateBinaryKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
idcdurl.todohttps://todo-g7g.amazon.com/FionaTodoListProxy:
k <class value="BaseDeviceDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
k <class value="SoftwareComponent:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
l <class value="GetUpdateContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
l <class value="ThrottledException:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
m <class value="DependencyException:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
m <class value="OtaGroupIdContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
mdcdurl.cdehttps://cde-g7g.amazon.com/FionaCDEServiceEngineA
n <class value="DeliveryRestrictions:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
n <class value="PutUpdateBinaryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
n <class value="RangeBasedUpdatePath:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
n <class value="SoftwareComponentKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
o <class value="DeviceIdListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
o <class value="PutDeviceDetailsInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
o <class value="UpdateBinaryContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
odcdurl.storehttps://www.amazon.com/gp/digital/juno/index.html(
q <class value="FailedOtaGroupInsertion:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q <class value="GetUpdatePathQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q <class value="OtaGroupIdListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q <class value="RangeBasedUpdatePathKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q <class value="SoftwareVersionByDevice:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
q <class value="UpdatePathListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
r <class value="BaseGetUpdatesQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
r <class value="InvalidArgumentException:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
r <class value="SoftwareComponentVersion:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
rMAP certificate pinning list: https://code.amazon.com/packages/MAPAndroidLib/blobs/mainline/--/pinned-ca-roots.pem
s <class value="AvailableUpdatesContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
s <class value="PutDevicesInOtaGroupInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
s <class value="UnauthenticatedDeviceType:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
s <class value="UpdateBinaryListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
t <class value="DeviceGetUpdatesQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
t <class value="OfferedUpdateListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
t <class value="PutDevicesInOtaGroupOutput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
t <class value="SoftwareComponentContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
u <class value="SoftwareComponentDependency:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
u <class value="SoftwareComponentVersionKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
v <class value="PaginatedOtaGroupIdContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
w <class value="DeviceIdWithSoftwareComponent:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
x <class value="PaginatedDeviceIdListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
x <class value="SoftwareComponentDependencyKey:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
x <class value="SoftwareComponentListContainer:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
xorg.slf4j.LoggerFactory could not be successfully initialized. See also http://www.slf4j.org/codes.html#unsuccessfulInit
z <class value="GetUpdatesForCompanionQueryInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
z <class value="PutSoftwareVersionsByDeviceInput:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
{ <class value="InstalledSoftwareComponentDetails:http://internal.amazon.com/coral/com.amazon.devicesoftwaretracking/"/>
nonsec_gelato_55.bin
doesn't have one single google or github hit here, so maybe:
# strings mmcblk0p16 | grep "\.bin" | sort -u
%sso_data_migrator.bind_timeout_millis
/sdcard/Aspen.bin
0Failed to copy binary file: nonsec_gelato_55.bin
:Binary copied nonsec_gelato_55.bin -> /cache/OZ20A___FWG55
Firmware.bin
_(.*).bin$
_(\d+).bin$
android.binder.objects.death
android.binder.objects.local
android.binder.objects.proxy
batterystats.bin
batterystats.bin.tmp
batterystats.bin_ext }
com.amazon.client.metrics.bind
entropy.bin
nonsec_gelato_55.bin
stats.bin
stats.bin.bakkak
status.bin
status.bin.bakak
might be interesting as well
can you share the output of cat /proc/cmdline
from that 5.5.2.1 device?
root@biscuit:/ # cat /proc/cmdline
console=tty0 console=ttyS0,921600n1 console=ttyMT0,921600n1 earlycon=uart8250,mmio32,0x11002000 root=/dev/ram vmalloc=496M androidboot.hardware=mt8163 androidboot.unlocked_kernel=true androidboot.rpmb_state=1 androidboot.secure_cpu=1 androidboot.prod=1 androidboot.pl_version=0x0005 androidboot.tee_version=0x0102 androidboot.lk_version=0x0000 androidboot.pl_build_desc=bd7ae89-20221003_215949 androidboot.lk_build_desc=beb022a-20211202_231918 bootopt=64S3,32N2,64N2 androidboot.selinux=enforce androidboot.slot_suffix=_a printk.disable_uart=1 bootprof.pl_t=4150 bootprof.lk_t=3408 boot_reason=0 androidboot.serialno=XXXXXXOBSCUREDXXXXXXX androidboot.bootreason=power_key nt35521_id=0
The dot is opened up on the bench with a piece of foil shorting out c52. The terminal says "Waiting for bootrom" Should the rotating blue led show be happening? How long do I need to wait?
@frostworx That sucks. I saw the preprod in the url and was hoping that is a developer device.
@Billybangleballs no if you had it shorted correctly, it will not show blue light
@frostworx how old is that firmware grep build.date /system/*.prop
root@biscuit:/ # grep build.date /system/*.prop
ro.build.date=Sat Mar 24 07:18:52 UTC 2018
ro.build.date.utc=1521875932
The oldest OTA I have is from Dec 2016, followed by one from July 2019. Its a shame we don't have url for this one. It would have been one of the oldest firmware
just have seen this in dmesg: :)
<4>[ 0.057735] <0>**********************************************************
<4>[ 0.057749] <0> (0)[1:swapper/0][name:trace&]** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
<4>[ 0.057758] <0> (0)[1:swapper/0][name:trace&]** **
<4>[ 0.057767] <0> (0)[1:swapper/0][name:trace&]** trace_printk() being used. Allocating extra memory. **
<4>[ 0.057776] <0> (0)[1:swapper/0][name:trace&]** **
<4>[ 0.057785] <0> (0)[1:swapper/0][name:trace&]** This means that this is a DEBUG kernel and it is **
<4>[ 0.057794] <0> (0)[1:swapper/0][name:trace&]** unsafe for produciton use. **
<4>[ 0.057803] <0> (0)[1:swapper/0][name:trace&]** **
<4>[ 0.057812] <0> (0)[1:swapper/0][name:trace&]** If you see this message and you are not debugging **
<4>[ 0.057821] <0> (0)[1:swapper/0][name:trace&]** the kernel, report this immediately to your vendor! **
<4>[ 0.057830] <0> (0)[1:swapper/0][name:trace&]** **
<4>[ 0.057839] <0> (0)[1:swapper/0][name:trace&]** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
Its still there in latest 6.5.6.0 image. So I guess they never disabled it
Anyways I think we can close this. If anyone have any issues, they can start a new issue
I think I've broken the dot, it doesn't work anymore, I shall have to go and check ebay for another one.
@Billybangleballs did the rooting process got completed? Can you share the output of rooting process?
Also have you tried booting using mtkclient like the readme asks you to do?
[18:55:33] Waiting for bootrom [19:01:34] Waiting for bootrom [19:22:11] Waiting for bootrom [19:24:10] Waiting for bootrom [20:27:09] Waiting for bootrom [21:02:20] Waiting for bootrom
So that is as far as I got. I spent all day installing python3.8, but the amonet code that required it has been changed, so it might work on 3.7 now if I can get the dot to respond. I'm having to revert the python3.8 because it has broken my pi. apt-get requires python3.7 and refuses to play with other versions. I managed to short out the capacitor, (no blue leds), but the software just waited for bootrom that never materialised. So really, I'm no further on than I was last week. I will take another look next week when I get time.
@Billybangleballs Just confirming that you are following proper steps
1) run python3 main.py
. choose step for rooting, choose step rooting again. and follow any other prompts until it reaches the waiting for bootrom prompt
2) short the capacitor to ground and while keeping it shorted
3) plug the echodot to pc or whatever you are using to run the script.
Exactly in that order. Please confirm that you are not plugging the echo dot first and then running the script. Also that capacitor and other surface mounted things besides it are extremely fragile and can be easily knocked off. So make you are not puting too much pressure when trying to short the capacitor
@Billybangleballs, it would make sense if you opened a separate issue for that, as this one was closed. good luck!
@frostworx I had the same idea about 12 hours ago ;)
Hi there, First of all, thanks for this promising project! :)
I bought an echo dot2 just to try it and it arrived earlier today. Unfortunately, I have to admit that I'm a bit lost already with rooting the devices. It could be opened up easily, but I'm not sure how to follow those instructions:
INFO: Please short the device as shown in the image at https://dragon863.github.io/blog/mainboard.jpg
My first guess to simply ground it somewhere while plugging it into usb was apparently wrong (would have been too easy :)) so I'm afraid I'll have to communicate through the tiny pins shown here:
https://forum.xda-developers.com/t/amazon-echo-dot-2-locked-hardware.3512349/#post-77059942
right?
The url to the "set of slides" below the picture is 404 btw, but the good old wayback machine has a copy:
https://web.archive.org/web/20190926005232/https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1498230402.pdf
Would be great if you had a pointer into the right direction on how to short the device (still have (low) hopes that high precision soldering is not required :))