View Single Post
Old 10-10-2025, 12:24 AM   #5
k_o
Junior Member
k_o began at the beginning.
 
Posts: 8
Karma: 10
Join Date: Aug 2023
Device: inkpalm
dont think so since there are no visible screws. i think the only way to disassemble is by removing the glued-in screen

i accidentally put it into edl mode (0x9008) the other day which got me researching that as a viable data recovery path.
if i dump the userdata partition (which i assume exists, i tried using cli tool edl to check but couldn't get past 'device detected ') would i be able to decrypt it?

to expand on edl attempt:
i tried 'printgpt' alone first (which i figure is a low-risk read cmd) but i was still stuck at 'device detected'.
so i tried again, loading '0014d0e100000000_d40eee56f3194665_FHPRG.bin', but it was still stuck.

i figured i should pause there so i didnt brick it, since loading usually implies writing

but i did find 2 other loaders in my research i could try, if there is no harm in it:
0000000000000000_bdaf51b59ba21d8a_fhprg.bin
Qualcomm_662_loader.elf

that said if a loader is *not* necessary to run 'printgpt' then i'll continue to troubleshoot edl itself first
k_o is offline   Reply With Quote