View Single Post
Old 07-30-2021, 03:04 PM   #3
fantasword
Junior Member
fantasword began at the beginning.
 
Posts: 9
Karma: 10
Join Date: Sep 2014
Device: boox m96
Quote:
Originally Posted by Renate View Post
If you decrypt update.upx you get a normal update.zip
In META-INF/com/google/android/updater-script you have all the checking, like:
Code:
(!less_than_int(1617202974, getprop("ro.build.date.utc"))) || abort("E3003: Can't install this package (Wed Mar 31 23:02:54 CST 2021) over newer build (" + getprop("ro.build.date") + ").");
getprop("ro.product.device") == "Poke3" || abort("E3004: This package is for \"Poke3\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Target: ONYX/Poke3/Poke3:10/2021-03-31_23-02_3.1_0631e26/1914:user/dev-keys");
But since this is patching partitions it will probably not help you to circumvent the safeguards.
You can try, but have a plan for when you brick your device.
I think I will need 3 strings to decrypt the .upx file, which I don't have now.

Even though I got the zip file, is the Note air has some workable recovery, like TWRP in most Android phone?

I know that we can write img file to the device by Fastboot way, but I don't know how many img files to make it work.
fantasword is offline   Reply With Quote