dont think so since there are no visible screws. i think the only way to disassemble is by removing the glued-in screen
i accidentally put it into edl mode (0x9008) the other day which got me researching that as a viable data recovery path.
if i dump the userdata partition (which i assume exists, i tried using cli tool edl to check but couldn't get past 'device detected

') would i be able to decrypt it?
to expand on edl attempt:
i tried 'printgpt' alone first (which i figure is a low-risk read cmd) but i was still stuck at 'device detected'.
so i tried again, loading '0014d0e100000000_d40eee56f3194665_FHPRG.bin', but it was still stuck.
i figured i should pause there so i didnt brick it, since loading usually implies writing
but i did find 2 other loaders in my research i could try, if there is no harm in it:
0000000000000000_bdaf51b59ba21d8a_fhprg.bin
Qualcomm_662_loader.elf
that said if a loader is *not* necessary to run 'printgpt' then i'll continue to troubleshoot edl itself first