For those of you interested, I was able to pull the following strings for the BOOX Note Air:
Code:
'NoteAir': {
"MODEL": "NoteAir",
"STRING_7F00500": "U04vqHYo0LFoJQAvP3Rs1aBxySs7z4T1B+asamimEoAf", # settings
"STRING_7F00501": "VD1ZqgIl08305CVeftRI7qGBtq9bCMrJ3a1VkpkzjOu2", # upgrade
"STRING_7F00502": "PW8K6VI//Zt6iqjYQWN0LIwRTVYyDHJvHNEXFwWV" # local
},
The current firmware URL is:
Code:
http://firmware-us.boox.com/3df6fad536d71c6e8fa2df5a7fc710fe/update.upx
Which was derived via the following URL:
Code:
http://data.onyx-international.cn/api/firmware/update?where={"buildNumber":0,"buildType":"user","deviceMAC":"","lang":"en_US","model":"NoteAir","submodel":"","fingerprint":""}
I will post an update once I successfully decrypt the file.