Possible to replace unlock message with spaces using hex editor? - Asus Transformer TF700

Just wondering if it were possible to simply replace the "The device is unlocked" message with spaces in the Asus unlock .apk? I did check, and I can see the text in the .apk with a hex editor... While Asus would technically still know the device is unlocked (since it contacts them and records the activity), I'm think it may still help with warranty claims if the message were not printed on the screen at boot-up...
Or, do you think there are checks within the .apk to make sure stuff hasn't been modified? Or do you think it's not even worth the risk of trying this since Asus will still know it's unlocked because it keeps track of the serial numbers?
Just wanted to get some input on this...
Thanks!

Related

Is there a possibility to put "my info" in my HD2?

In my old PDA (Dell Axim) there was a possibillity that the owner of the device could type into a screen, called "My Info", his name, (e-mail)address, phone number and a personal message that said (i.e.): "If found, please return this device to owner (reward included) - Thank you!".
That screen would immediately pop up when anyone would start up the device but it was still locked by the user. So basicly, the finder could not do anything with the device, other than trying to format it completely if he would have kept it to use it himself.
Unfortunately, my HTC HD2 does not have the "my info'' possibility; at least, not that I know off. So, if I would lose my device, an honoust finder would not know who would be the rightfull owner to return it to.
Is any of you familliar with the possibility to make this possible on my device? Maybe by installing some extra software or so?
I hope I will hear from you shortly.
Thanking you in advance.
Best regards,
Robert,
Netherlands
am i mistaken or is there not a contact card in the contacts for "my info" including name, address and the like
Go to contacts tab, click more and there you'll see a contact card 'me' (Ik in dutch)
There you can put in this info
Ropie58 said:
In my old PDA (Dell Axim) there was a possibillity that the owner of the device could type into a screen, called "My Info", his name, (e-mail)address, phone number and a personal message that said (i.e.): "If found, please return this device to owner (reward included) - Thank you!".
That screen would immediately pop up when anyone would start up the device but it was still locked by the user. So basicly, the finder could not do anything with the device, other than trying to format it completely if he would have kept it to use it himself.
Unfortunately, my HTC HD2 does not have the "my info'' possibility; at least, not that I know off. So, if I would lose my device, an honoust finder would not know who would be the rightfull owner to return it to.
Is any of you familliar with the possibility to make this possible on my device? Maybe by installing some extra software or so?
I hope I will hear from you shortly.
Thanking you in advance.
Best regards,
Robert,
Netherlands
Click to expand...
Click to collapse
http://forum.xda-developers.com/showthread.php?t=583638
5. Enable Hidden Owner Info in All Settings\Personal Folder
Go to HKLM\ControlPanel\Owner and change Hide from 1 to 0 and then reset. You can now enter your name you want to register old apps.
Karsten
Or use BsB Tweaks and turn on the option "Owner Info"
Well, there IS a "me"-card in contacts for my info, the only problem is that this info would never be seen by the person that would find the lost HD2 device when it is locked with its password...
Ropie58 said:
Well, there IS a "me"-card in contacts for my info, the only problem is that this info would never be seen by the person that would find the lost HD2 device when it is locked with its password...
Click to expand...
Click to collapse
You could always make up a skin with your personal info on it. Make it 480 x 800 and .cab it, and make it your lock screen.
wolfee said:
You could always make up a skin with your personal info on it. Make it 480 x 800 and .cab it, and make it your lock screen.
Click to expand...
Click to collapse
That suggestion I also had in mind, but I hoped there would be a much more easier solution...
Thanks for your reply!
Robert.
@Karsten
I really would like to try your suggestion, only I have trouble understanding your path... What is "HKML" and how do I get there? Is it correct from me to understand that I will find the "All Settings\Personal Folder" in "HKLM\ControlPanel\Owner"? And what do you mean by "you want to register your apps"?
Hope to hear from you soon.
Thanks for your reply!
Robert
Ropie58 said:
@Karsten
I really would like to try your suggestion, only I have trouble understanding your path... What is "HKML" and how do I get there? Is it correct from me to understand that I will find the "All Settings\Personal Folder" in "HKLM\ControlPanel\Owner"? And what do you mean by "you want to register your apps"?
Hope to hear from you soon.
Thanks for your reply!
Robert
Click to expand...
Click to collapse
Ok what he means is to use a reg editor program like Total Commander or PHM reg Edit to change the reg key. Here is a cab that will change the reg for you. when it comes to reg some Paid programs it requires you to enter your name or email Addy in the owner info.
jbirdeagle
Here is an easy way to put your "My Info" on your HD2 in case it gets lost.
On a notepad or whatever, write your name and phone number, then take a picture of it and save it to "locked phone wallpaper". It can be nicely decorated or plain. I was really worried about not finding that option (old phone Wing had this) saw locked phone wall paper under settings, personalize.

IMEI is ZERO'd out! :(

hi i was fooling around with my new lg thrill and now my imei's been zero'ed out everything seems to work fine but i don't want to use it on the network because of my sketch imei.
heres what ive tried so far:
- tried the o2x method of using telnet (hyperterminal) and using the at command but i keep getting IMEI WRITE ERROR or something along those lines.
- tried looking around for some kind of system files like sammy's nv_data.bin but i haven't found anything yet. anybody know which file/s on the lg android filesystem store the imei?
ANY IDEAS
i mean worst case scenario i'll play dumb and have att replace it, but i dont want to drive all the way over to att and make up a bs excuse. id rather fix it at home.
thanks everyone! i really screwed up and once i get this fixed up i'll make sure i have proper backups before trying stuff out.
I didn't find too ... nv_data.bin i think is just for samsung and other ... i don't know what's for lg ... try to do a hard reset ... if that doesn't work you will need to go to att
i have the phone set up exactly how i want right now so i was hoping i could repair the imei and then do a nandroid backup or something
anyone know where the imei's stored on the lg phones? i read its in lgdrm somewhere but all i see are .cer files which i can't read or make sense of with notepad, a hex editor, or sqlite 3... :?
if i can figure this out soon i'll try factory reset and if taht doesnt work then i'll try to get it replaced by att.

[Q] Change Device ID? - Attempting to restore back to new phone same model

My girlfriend lost her Samsung Focus and received a new one from AT&T. She was very upset that she lost all her data on the phone and I had updated her old one to Mango, so I knew there was a backup saved. However at first it wouldn't recognize the backup (different device ID) so I changed the device ID in the folder name, properties.xml, and manifest.xml files. Zune now recognizes it as a restore point for that phone but refuses to install it, giving various errors such as 'backup not valid', etc.
I am beginning to think I should give up, but I wanted to know if any of you WP7 gurus knew of a way to change the Device ID of the phone itself, perhaps in the Registry Editor? I'm an Android user so I'm familiar with rooting with those phones but WP7 is a little different. I know I'd have to use Chevron and then put a registry editor XAP on there, but I haven't had a chance to do it yet..
So, is there any way to change the device ID?
The other possible solution I was thinking of was running a WP7 emulator and changing the device ID to match the old phone and do a restore through there (if that's even possible), then changing the device ID again to match the new phone and creating a new backup, which I could then send to the new phone?
100% I saw DeviceID setting in registry (exact value as returned by API call) but can't recall where now.
Update: try to change string [HKCU\Software\Microsoft\ActiveSync\DeviceID]
Thanks, i'll try it next time she's over. Hopefully I don't FUBAR her phone. I did tons of search about this subject before posting and couldn't find any evidence of anyone trying to change their device ID.
sensboston said:
100% I saw DeviceID setting in registry (exact value as returned by API call) but can't recall where now.
Update: try to change string [HKCU\Software\Microsoft\DeviceID]
Click to expand...
Click to collapse
Can you possibly do me a favor and use one of the DeviceID apps or something to verify that the field in that registry key matches your device's ID?
Just checked on my Samsung: DeviceID at HKCU\Software\Microsoft\ActiveSync\DeviceID (I've corrected registry path) is not related to the Zune's backup DeviceUrlID (it's different ID's, I think so)...
Darn. I'll have to see if there is a way to find it in there.
I'm pretty sure the ID used for the backup is stored in hardware; if it wasn't then it wouldn't survive a hard reset. Unfortunately, I think the backups are also encrypted, so unless you could somehow get the key out of the old phone it wouldn't be any good anyhow.
It would be awesome if you could find a way to move a backup between phones, but so far that hasn't been possible.
sensboston said:
100% I saw DeviceID setting in registry (exact value as returned by API call) but can't recall where now.
Update: try to change string [HKCU\Software\Microsoft\ActiveSync\DeviceID]
Click to expand...
Click to collapse
How do you get access to that string (AcitveSync DeviceID) using the API?
Thanks,
Jason

[Q] question about new phone

I posted this question in the venue pro section but no luck. I purchased a dell venue pro off of amazon and when I dial ##634#on the phone and go into phone/security info it says unlock/*****us_TMOU_simloc
So my question is : does this mean that the phone is unlocked (able to side load apps) but sim locked.
Doubtful that it's dev-unlocked (able to sideload) as no phone comes that way by default, and I think you'd have noticed if you'd done the procedure to dev-unlock it (it's not hard, typically, but you don't do it by accident).
There's a registry viewer (also supposed to have editing ability, but nobody has made it work that I know of) built into the EM app as well. It's a bit hard to get to (I could find it again, but I had to decompile the app to do so), but you could check the developer-unlock regisistry value that way.

[DISCUSSION] A thread to collate and share what is known about unlocking fastboot on Oppo devices

Admin: Please move/delete this thread if it is in the wrong place or against the rules.
I wanted to create a thread to discuss unlocking fastboot mode on Oppo devices in general, rather than discussing it in terms of any one device in particular. The reason being is that there are currently little bits of information scattered here and there across various different device forums. I think it would be useful to have somewhere where we could pool our information on the subject.
I will say at this point, I'm not sure what progress can be made, but I do think we could answer some of each other's questions and build a bigger picture of what is going on.
One question I have for example, that I know someone out there will know, or be able to test, is if you have enabled engineer mode with the sec5 app, or otherwise, are you then able to invoke methods from the 'android.engineer.OplusEngineerManager' class without getting an selinux error?
I have decompiled the deeptesting app and looked through the sources a little and found the method that unlocks fastboot mode. Its signature is as follows:
fastbootUnlock(byte[ ] bArr, int i)
The byte array is essentially formed as followed:
a string is split into pairs of characters,
each pair is a hex code that is converted to an int,
the byte value of each of these integers is then stored in a byte array.
The int that the fastbootUnlock method takes is simply the length of the byte array.
I have a find x3 pro and have hit a bit of a brick wall in testing in that I cannot invoke methods from the 'android.engineer.OplusEngineerManager' class however I do suspect that with engineer mode enabled it may be possible to invoke methods from this class.
If you have any information you feel may be relevant, any questions, or even just want to say hello, do not hesitate to post
So, no major breakthroughs to report but some stuff that may be of use to people.
After hitting a bit of a brick wall disassembling the deeptesting and engineermode apks I have turn my attention to the system.
Both these apks rely on custom services implemented by oppo (Although most files relating to them have oplus in the name)
After loading up one of the service files '[email protected]' in ida I think I can see that the key required to unlock fastboot mode is stored on the odm partition in /odm/etc/DownloadModeKey/ (This is a little over my head but I can see multiple references to this)
Also I have found an xml with a list of mmi codes, I don't know how much use it will be to anyone, but there are a couple in there that I dont believe have been documented elsewhere, so I will upload it here
I did some very cursory reverse-engineering of the deeptest app and basically came to the conclusion that it depends on the response from Oppo's servers. In a properly designed system (which the original Danger hiptop/T-Mobile Sidekick implemented) there's an unlock entitlement cryptographically signed by the OEM. I *assume* that's the case here, but I don't know for sure.
super5at said:
I did some very cursory reverse-engineering of the deeptest app and basically came to the conclusion that it depends on the response from Oppo's servers. In a properly designed system (which the original Danger hiptop/T-Mobile Sidekick implemented) there's an unlock entitlement cryptographically signed by the OEM. I *assume* that's the case here, but I don't know for sure.
Click to expand...
Click to collapse
Getting the correct response from Oppo servers allows the app to invoke the fastbootUnlock method however I believe the key required for the method is stored on device.
From my point of view, the biggest, and perhaps only remaining, hurdle is being able being able to invoke methods from the OplusEngineerManager class from our own apps.
I know the method required and and what parameters should be passed to it. I strongly suspect from reverse engineering the engineer service the key is stored on device. This key is then seperated into pairs of digits and convertered to a byte array. The fastbootUnlock method takes 2 parameters, the byte array and an integer that is equal to the length of the byte array.
Hi! I'm trying a different approach, to spoof the device model so that the deep test.apk will do its thing.
I have the realme gt 2 (EU) RMX3311 that can't be unlocked but the Indian version (RMX3312) can be unlocked. Some guys managed to change the region of the RMX3311 to India and the deep test apk allowed the bootloader to be unlocked. So, from what I've read, deep test reads build.prop and if it finds the right model it communicates with realme backend to receive the unlock code, and everything works...
Now I'm trying to find in the deep test apk when it reads the device model and change that code so it accepts whatever it finds The problem is I can't understand smali source code )
wizard8400 said:
Hi! I'm trying a different approach, to spoof the device model so that the deep test.apk will do its thing.
I have the realme gt 2 (EU) RMX3311 that can't be unlocked but the Indian version (RMX3312) can be unlocked. Some guys managed to change the region of the RMX3311 to India and the deep test apk allowed the bootloader to be unlocked. So, from what I've read, deep test reads build.prop and if it finds the right model it communicates with realme backend to receive the unlock code, and everything works...
Now I'm trying to find in the deep test apk when it reads the device model and change that code so it accepts whatever it finds The problem is I can't understand smali source code )
Click to expand...
Click to collapse
Hi! You might find it easier to understand the flow of the app if you decompile to java, the output won't be compilable but you could pinpoint where the region is checked and cross reference that to the smali code you have, you could at least get some idea of where to start.
I will say, if a modified version of the app can still access the OplusEngineerManager class without an selinux denial, then you could probably just get your download mode key by doing a dump of your device in edl mode and then modify the app to call its fastbootUnlock method with the key from your dump.
I haven't tested this because on my find x3 pro I can't even install the deeptesting app.
I haven't tried to do much in a while because I've gotten a bit stuck trying to work out how to calculate the secrecy token. I am not great with C and trying to understand decompiled pseudocode is a little bit beyond me lol. Quite disheartening too knowing that even if it was possible to work out that token by disassembling system services, it still might not mean I was able to access the OplusEngineerManager class.
Luddite I be. Tired and couldn't workout how to cancel a post
Kernel source and Device tree released
As oppo-source has released kernel_source and device_tree for find x3 and find x3 pro what possibility could be related to custom kernel, custom rom and i know the bootloader unlock issue does these two source code help in unlocking the...
forum.xda-developers.com
burhanhanzada199888 said:
Kernel source and Device tree released
As oppo-source has released kernel_source and device_tree for find x3 and find x3 pro what possibility could be related to custom kernel, custom rom and i know the bootloader unlock issue does these two source code help in unlocking the...
forum.xda-developers.com
Click to expand...
Click to collapse
Always great to get a notification for this thread
The release of the kernel sources for the Find X3 Pro is slightly old news, sadly I don't think there is much to be found in regards to unlocking the bootloader or engineer mode.
Secrecy/Engineer mode unlock possible (For a limited time), for more info please see here:
Secrecy unlock
WARNING - THIS (ORIGINAL) METHOD IS NOT WORKING WARNING - BE CAREFULL REGARDING (your) IMEI SHARING ! You need to enable Developer Options and USB Debugging in the Phone Download the Oppo_Free_Unlock_v1.0.zip Secrecy Auto Unlocker : Open the...
forum.xda-developers.com
Small update:
Decided to try and pull the DownloadModeKey from my Find X3 pro via adb, the operation was a success but sadly it just looks like an RSA public key so not much use.
User154 said:
Small update:
Decided to try and pull the DownloadModeKey from my Find X3 pro via adb, the operation was a success but sadly it just looks like an RSA public key so not much use.
Click to expand...
Click to collapse
Continue work bro
Hi there,
I have reverse engineered the process deep testing apk does and recreated it independently of the phone.
Suppose I have the "token" which is sent as a byte array to android.engineer.OplusEngineerManager method fastbootUnlock, what will that achieve, except the unlock ofcourse?
I am new to the oppo ecosystem and trying to understand what powers this engineerMode has.
serv0id said:
Hi there,
I have reverse engineered the process deep testing apk does and recreated it independently of the phone.
Suppose I have the "token" which is sent as a byte array to android.engineer.OplusEngineerManager method fastbootUnlock, what will that achieve, except the unlock ofcourse?
I am new to the oppo ecosystem and trying to understand what powers this engineerMode has.
Click to expand...
Click to collapse
So I don't actually know for sure what else that method would do, but I can't imagine it would do much else. The OplusEngineerManager class contains multiple methods that do different things, from what I could see most of them are not called by the deeptesting app at all I think I have found the library that the OplusEngineerManager class calls but I'm not 100% sure.
Have you got the token?
Hey folks - apologies for being late to the party, but thought I'd add my findings.
I stumbled across this thread & a few others after doing some digging into the "in-depth testing" tool. A few things:
I can't actually *install* the "in-depth testing" APK on my Find X5 Lite (a.k.a Reno 7 5G) - it seems like some version of the tool is already baked in to the stock ROM, so whatever APK I got my hands on fails to install because of conflicts.
I thought about trying to repack the APK, but apktool wasn't having it so I gave up pretty quickly.
I decompiled the version of the APK I have, and it looks like it's referencing the class "android.engineer.OppoEngineerManager" when it calls a "fastbootUnlock" method (already established above, I know I know)
I did some poking around and pulled (what I believed to be) the engineer mode APK using ADB, but after decompiling it things started to get a bit... weird. All of this is in a completely *different* namespace, it seems, and it's "com.oplus.engineermode" - so I have a hunch that I'm looking at bits of two different codebases. No luck, then.
One of the other threads I was looking at mentioned there being a couple things of interest in the /odm/ directory - seemingly what the "fastbootUnlock" method was actually calling *into* - but I wasn't able to pull any of that over ADB. Seems the directory is protected :/
With that in mind, I went on a quest to find a stock ROM to dig around in there. I did manage to find one and download it, but actually getting anything *out* of it has been a massive pain in the ass.
The stock ROM I found just has a big old ".ofp" file in it, instead of anything sensible - so in other words, proprietary garbage.
I had to use a dedicated extractor to get any files out of it, but even *that* wasn't enough; all of the juicy stuff is split into multiple ".img" files, and there's a bunch of different bits and pieces for the "super" image.
The bits and pieces for that super image are mentioned in a "mapping" file. This is just a text document that matches up different regions/carriers with the parts of the super image that you need.
All of the parts of the super image (once you've figured out which ones you need) need to be joined together. Just running "cat super0.xxxxx.img super1.xxxxx.img super2.xxxxx.img" seemed to work for this? (... but I was also able to use "simg2img" from the android otatools as well, see below)
But the troubles don't end here! This is a sparse image, so you need to go through *another* step to deflate it. I wound up using "simg2img" for this, and it gave me a final, honest-to-god super image. (imjtool was also able to do this for me)
Then comes the process of actually *extracting* the component parts of the super image. I originally used "lpunpack" (also from the android otatools) for this, but the output was really bizarre. *Some* of the output files were mountable ext4 partitions, but the ones I cared about *weren't*. More specifically, the files for the "product", "vendor", "system" and "odm" partitions were all just... gibberish. I wasn't able to mount them at all.
After some more searching I came across "imjtool", which is available here. And this tool has singlehandedly saved my entire ass. I got it to extract the super image again, and LO AND BEHOLD, it was able to identify the file system used by the "product", "vendor", "system" and "odm" partitions. It's.... (drum roll please) Huawei EROFS. More proprietary garbage.
Now that I *know* this, I can see the light at the end of the tunnel, and I think I have a reasonable chance of grabbing whatever-the-... the in-depth testing APK is actually calling *into*. Hopefully then I can decompile that, and figure out what the hell fastboot is doing on this device.
If I manage to get anywhere, I'll mention it here ^^ it's been a bit of a rigmarole so far haha
{Mod edit: Inappropriate language edited. Oswald Boelcke, Senior Moderator}
mkaylynn7 said:
Hey folks - apologies for being late to the party, but thought I'd add my findings.
I stumbled across this thread & a few others after doing some digging into the "in-depth testing" tool. A few things:
I can't actually *install* the "in-depth testing" APK on my Find X5 Lite (a.k.a Reno 7 5G) - it seems like some version of the tool is already baked in to the stock ROM, so whatever APK I got my hands on fails to install because of conflicts.
I thought about trying to repack the APK, but apktool wasn't having it so I gave up pretty quickly.
I decompiled the version of the APK I have, and it looks like it's referencing the class "android.engineer.OppoEngineerManager" when it calls a "fastbootUnlock" method (already established above, I know I know)
I did some poking around and pulled (what I believed to be) the engineer mode APK using ADB, but after decompiling it things started to get a bit... weird. All of this is in a completely *different* namespace, it seems, and it's "com.oplus.engineermode" - so I have a hunch that I'm looking at bits of two different codebases. No luck, then.
One of the other threads I was looking at mentioned there being a couple things of interest in the /odm/ directory - seemingly what the "fastbootUnlock" method was actually calling *into* - but I wasn't able to pull any of that over ADB. Seems the directory is protected :/
With that in mind, I went on a quest to find a stock ROM to dig around in there. I did manage to find one and download it, but actually getting anything *out* of it has been a massive pain in the ass.
The stock ROM I found just has a big old ".ofp" file in it, instead of anything sensible - so in other words, proprietary garbage.
I had to use a dedicated extractor to get any files out of it, but even *that* wasn't enough; all of the juicy stuff is split into multiple ".img" files, and there's a bunch of different bits and pieces for the "super" image.
The bits and pieces for that super image are mentioned in a "mapping" file. This is just a text document that matches up different regions/carriers with the parts of the super image that you need.
All of the parts of the super image (once you've figured out which ones you need) need to be joined together. Just running "cat super0.xxxxx.img super1.xxxxx.img super2.xxxxx.img" seemed to work for this? (... but I was also able to use "simg2img" from the android otatools as well, see below)
But the troubles don't end here! This is a sparse image, so you need to go through *another* step to deflate it. I wound up using "simg2img" for this, and it gave me a final, honest-to-god super image. (imjtool was also able to do this for me)
Then comes the process of actually *extracting* the component parts of the super image. I originally used "lpunpack" (also from the android otatools) for this, but the output was really bizarre. *Some* of the output files were mountable ext4 partitions, but the ones I cared about *weren't*. More specifically, the files for the "product", "vendor", "system" and "odm" partitions were all just... gibberish. I wasn't able to mount them at all.
After some more searching I came across "imjtool", which is available here. And this tool has singlehandedly saved my entire ass. I got it to extract the super image again, and LO AND BEHOLD, it was able to identify the file system used by the "product", "vendor", "system" and "odm" partitions. It's.... (drum roll please) Huawei EROFS. More proprietary garbage.
Now that I *know* this, I can see the light at the end of the tunnel, and I think I have a reasonable chance of grabbing whatever-the-... the in-depth testing APK is actually calling *into*. Hopefully then I can decompile that, and figure out what the hell fastboot is doing on this device.
If I manage to get anywhere, I'll mention it here ^^ it's been a bit of a rigmarole so far haha
{Mod edit: Inappropriate language edited. Oswald Boelcke, Senior Moderator}
Click to expand...
Click to collapse
Hi, sorry I only have chance to write a quick reply, I had a similar headache trying to extract the system files
I did manage to do it in the end, and I can unlock engineer mode on my find x3 pro, if you want any specific files, pm me and I'll send then over
What files were you looking for? I think the apk makes calls to the service I mentioned in OP I have had a look in IDA but I am not so great at understanding the pseudo code so have not gotten very far
User154 said:
Hi, sorry I only have chance to write a quick reply, I had a similar headache trying to extract the system files
I did manage to do it in the end, and I can unlock engineer mode on my find x3 pro, if you want any specific files, pm me and I'll send then over
Click to expand...
Click to collapse
How about the unlock bootloader ?
xuanhoang1811 said:
How about the unlock bootloader ?
Click to expand...
Click to collapse
This requires firstly the code which I do believe has to come from Oppo/Realme/whoever. The code stored on the device is an RSA key that the code is presumably checked against.
If someone manages to work out how to get code from Oppo unofficially then we need a way for an app to invoke the fastbootUnlock method from a custom app.
I haven't done much on this recently, I have been working on other projects, sorry.
Hi just wanted to say that it's nice to hear that some people try to unlock Bootloader on OPPO Qualcomm i thought that everyone accepted that it's not possible to unlock it and if you didn't know there is app called APKTool M you can read some root files with this app like this DownloadMode key and I can install Depp Testing app but I get this error:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
For extracting firmware maybe you can putting phone to EDL and extracting firmware with Qualcomm Softwares as said we can use ApkTool M to read some root files but not all I attach Deep testing file that worked for me here and site from where I got it:https://www.oppo.cn/thread-397164526-1

Categories

Resources