If you decrypt update.upx you get a normal update.zip
In META-INF/com/google/android/updater-script you have all the checking, like:
Code:
(!less_than_int(1617202974, getprop("ro.build.date.utc"))) || abort("E3003: Can't install this package (Wed Mar 31 23:02:54 CST 2021) over newer build (" + getprop("ro.build.date") + ").");
getprop("ro.product.device") == "Poke3" || abort("E3004: This package is for \"Poke3\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Target: ONYX/Poke3/Poke3:10/2021-03-31_23-02_3.1_0631e26/1914:user/dev-keys");
But since this is
patching partitions it will probably not help you to circumvent the safeguards.
You can try, but have a plan for when you brick your device.