hi , about 👍 To extract the firmware from the BGZ file you need to use the custom developed extraction method that's on the miner itself called jm. No passwords are set on the firmware file just a basic AES256 encryption that's easy to get around. Mind you, you will need an ARM env to do this as the binary is written for ARM architecture. You can do it directly on the ASICs themselves or extract and run elsewhere. The commands for extraction are
./jm miner.bgz miner.tar
tar -zxmf miner.tar
could you tell me more about arm environment, how to simulate ( vm) , arm 7 arm ...?? how du you get rid of the AES256 encryption? how to read the program then ( wiich soft/ editor? do i need to " pump the website also to get more info to rebuilt a firmare with oc / temp regulation ? thanks if could help
hi , about 👍 To extract the firmware from the BGZ file you need to use the custom developed extraction method that's on the miner itself called jm. No passwords are set on the firmware file just a basic AES256 encryption that's easy to get around. Mind you, you will need an ARM env to do this as the binary is written for ARM architecture. You can do it directly on the ASICs themselves or extract and run elsewhere. The commands for extraction are
./jm miner.bgz miner.tar tar -zxmf miner.tar
could you tell me more about arm environment, how to simulate ( vm) , arm 7 arm ...?? how du you get rid of the AES256 encryption? how to read the program then ( wiich soft/ editor? do i need to " pump the website also to get more info to rebuilt a firmare with oc / temp regulation ? thanks if could help