![]() |
FW 5.10.2-5.13.3 Software Jailbreak for PW4
1 Attachment(s)
:thanks: to coplate, knc1, NiLuJe, Branch Delay, SenorClean, hius07, et. al. without whom this wouldn't be possible.
This jailbreak method only works for PW4/Paperwhite 4/Paperwhite (2018)/Paperwhite (10th generation) Waterproof running firmware 5.13.3 or older. This does NOT work on firmware 5.13.4 or newer. Make sure to skip wi-fi setup or go on airplane mode to prevent automatic updates. This does NOT work on any Kindle aside from the PW4. Note, for extracting the packages on Windows, I recommend 7-Zip. This method has been tested working on new PW4 running stock firmware 5.12.4 or older and OTA updated PW4 running firmware 5.13.3 or older. There is always a chance that you could brick your device. Use at your own risk. Instructions Steps:
|
It's been a great time, more than one thousand instructions have been sent by my side to make users happier.
Thank you very much ilovejedd for your efforts! Life goes on! |
OK,Pw 4 (FW 5.13.2) jailbreak successfully!
|
but until last week it was not a state secret closed by oath? Maybe as soon as a new firmware update comes out, the veils fall
|
I arrived to install Kual, Kual Helper, USB-Network and other packages and I don't remember if I installed the Hotfix, if I install it twice now, does something happen?
|
Hotfix is safe to install any time.
|
(Updated Sticky ;)).
|
Quote:
|
The *real* reason for the cloak and daggers is and always has been that having an *easy* method waiting in the wings is always a good thing to have when someone contacts us to start working on attempting to dig into punching a hole somewhere applicable for something more wide-release.
Obviously, that hasn't actually happened in a while, though ;). (By which I mean, there's not been any actual attempts at anything since @BD. That was your usual reminder that if you want control over your device, don't get a Kindle.). |
The problem (IMHO) is that while the loophole was kept secret, the fact the PW4 was able to be jailbroken was not kept secret and so Lab26 finally found the loophole and closed it. I think if the fact that the PW4 was able to be jailbroken, the loophole may not ha=ve bee fixed in 5.13.4.
|
The loophole wasn't actually kept secret at all, because there's no actual loophole.
Someone just happened to get a Kindle that slipped a QA step and knew what do to with that fact ;). And we got extremely lucky with the way that QA image was packaged (which may, in fact, have been a quick shortcut to make the QA process more streamlined at the time, e.g., release crunch). It's entirely plausible that this happened to get fixed just because someone at lab126 was in the vicinity of the updater's code for whatever reason, looked at it and went: "well, that's dumb". |
Quote:
Interestingly enough, the diags firmware still passes initial version check so it's not automatically deleted on copy and still allows us to use Update Your Kindle via menu. I'm guessing there's a second verification check (at least as of 5.13.4) during the actual update install process which results in UPDATE ERROR: 12. I tried installing the diags first on a jailbroken PW4 with 5.13.4 which had the PRE_GM_DEBUGGING_FEATURES_ENABLED__REMOVE_AT_GMC file and downgrade worked on that. Factory reset followed by upgrade to 5.13.4 removed JB and hotfix and after that, diags firmware would no longer install. On a different note, there are several references to platform bellatrix on 5.13.4 so I do wonder if we're getting new Kindles soon. |
Oh, yeah, means they only fixed the initrd updater, which is admittedly the only one that matters nowadays ;).
|
thank you very much!
|
Could this method be utilized for other kindle jailbreaking. I have two voyage I’d like to hack.
|
| All times are GMT -4. The time now is 11:32 PM. |
Powered by: vBulletin
Copyright ©2000 - 3.8.5, Jelsoft Enterprises Ltd.
MobileRead.com is a privately owned, operated and funded community.