<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://soc.chipmunk.land/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Chipmunk</id>
	<title>Somewhat Obscure Computing - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://soc.chipmunk.land/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Chipmunk"/>
	<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/wiki/Special:Contributions/Chipmunk"/>
	<updated>2026-04-10T11:53:11Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=47</id>
		<title>ZTE Avid 4</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=47"/>
		<updated>2026-03-09T03:03:53Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: oops&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;&#039;ZTE Avid 4&#039;&#039;&#039; is an [[Android]] [[handset]] released by [[wikipedia:ZTE|ZTE Corporation]] in 2017. It includes the [[Qualcomm MSM8909]] chipset and has [[Android]] 7.0 preinstalled.&lt;br /&gt;
&amp;lt;!-- TODO: Make an infobox template for devices including name, model, codename, specs, etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== EDL mode ==&lt;br /&gt;
&lt;br /&gt;
[[Qualcomm EDL mode]] can be accessed on this phone easily using &amp;lt;code&amp;gt;adb reboot edl&amp;lt;/code&amp;gt;. The phone uses EMMC storage, and its EDL loader can be obtained [https://github.com/programmer-collection/zte/blob/master/Z855/prog_emmc_firehose_8909.mbn here].&lt;br /&gt;
&lt;br /&gt;
Be careful! Attempting to flash the phone using the EDL loader automatically detected by bkerler&#039;s client can result in a hard brick, requiring you to disassemble the phone to get back into EDL mode.&lt;br /&gt;
&amp;lt;!-- [[User:Chipmunk]] dumped the stock firmware of the device at https://etc.chipmunk.land/android/firmware/dumped/ZTE/Z855/Z855_MPCSV1.0.0B15.zip, however the phone&#039;s bootloader was unlocked once, and then relocked before dumping the firmware. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
&lt;br /&gt;
See [[Qualcomm EDL mode#Bootloader unlocking]]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=46</id>
		<title>ZTE Avid 4</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=46"/>
		<updated>2026-03-09T03:03:32Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;&#039;ZTE Avid 4&#039;&#039;&#039; is an [[Android]] [[handset]] released by [[wikipedia:ZTE|ZTE Corporation]] in 2017. It includes the [[Qualcomm MSM8909]] chipset and has [[Android]] 7.0 preinstalled.&lt;br /&gt;
&amp;lt;!-- TODO: Make an infobox template for devices including name, model, codename, specs, etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== EDL mode ==&lt;br /&gt;
&lt;br /&gt;
[[Qualcomm EDL mode]] can be accessed on this phone easily using &amp;lt;code&amp;gt;adb reboot edl&amp;lt;/code&amp;gt;. The phone uses EMMC storage, and its EDL loader can be obtained [https://github.com/programmer-collection/zte/blob/master/Z855/prog_emmc_firehose_8909.mbn here].&lt;br /&gt;
&lt;br /&gt;
Be careful! Attempting to flash the phone using the EDL loader automatically detected by bkerler&#039;s client can result in a hard brick, requiring you to disassemble the phone to get back into EDL mode.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[User:Chipmunk]] dumped the stock firmware of the device at https://etc.chipmunk.land/android/firmware/dumped/ZTE/Z855/Z855_MPCSV1.0.0B15.zip, however the phone&#039;s bootloader was unlocked once, and then relocked before dumping the firmware. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
&lt;br /&gt;
See [[Qualcomm EDL mode#Bootloader unlocking]]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=45</id>
		<title>Qualcomm EDL mode</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=45"/>
		<updated>2026-03-09T03:00:47Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Qualcomm EDL mode&#039;&#039;&#039; is a boot mode implemented in the [[boot rom]] of devices using [[Qualcomm SoCs]], which includes features such as reading/writing partitions. It can be used for purposes such as unbricking hard-bricked devices, or flashing partitions on devices that lack [[fastboot]] mode or an equivalent.&lt;br /&gt;
&lt;br /&gt;
Various clients for EDL exist, such as Qualcomm&#039;s own QFIL, [https://github.com/linux-msm/qdl qdl], or [https://github.com/bkerler/edl bkerler&#039;s &#039;edl&#039;]. Unless otherwise specified, the wiki will provide instructions using bkerler&#039;s client.&lt;br /&gt;
&lt;br /&gt;
== Dumping the stock OS ==&lt;br /&gt;
&lt;br /&gt;
The stock operating system of a device can be dumped with &amp;lt;code&amp;gt;edl rl backup --skip=userdata --genxml&amp;lt;/code&amp;gt;. This will dump every partition other than &amp;lt;code&amp;gt;userdata&amp;lt;/code&amp;gt; to a folder named &amp;lt;code&amp;gt;backup&amp;lt;/code&amp;gt;, and generate an XML file.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(command adapted from [[pmos:ZTE Axon 7 (zte-axon7)|here]])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Bootloader unlocking ==&lt;br /&gt;
&lt;br /&gt;
Some devices&#039; bootloaders can be unlocked using EDL mode, by editing the &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; partition.&lt;br /&gt;
&lt;br /&gt;
First of all, &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; must be dumped with &amp;lt;code&amp;gt;edl r devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Afterwards, the resulting &amp;lt;code&amp;gt;devinfo.bin&amp;lt;/code&amp;gt; should be opened in a hex editor. The partition should have the magic &amp;lt;code&amp;gt;ANDROID-BOOT!&amp;lt;/code&amp;gt; at the beginning, and optionally at other locations. Where it occurs, replace this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
00|00 00 00 00 00 00 00|00|00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
With this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
01|00 00 00 00 00 00 00|01|00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lastly, save the file, and flash it with &amp;lt;code&amp;gt;edl w devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(adapted from [[xda:bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/|this]] XDA thread)&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=44</id>
		<title>Qualcomm EDL mode</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=44"/>
		<updated>2026-03-09T03:00:04Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Show the modified octets&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Qualcomm EDL mode&#039;&#039;&#039; is a boot mode implemented in the [[boot rom]] of devices using [[Qualcomm SoCs]], which includes features such as reading/writing partitions. It can be used for purposes such as unbricking hard-bricked devices, or flashing partitions on devices that lack [[fastboot]] mode or an equivalent.&lt;br /&gt;
&lt;br /&gt;
Various clients for EDL exist, such as Qualcomm&#039;s own QFIL, [https://github.com/linux-msm/qdl qdl], or [https://github.com/bkerler/edl bkerler&#039;s &#039;edl&#039;]. Unless otherwise specified, the wiki will provide instructions using bkerler&#039;s client.&lt;br /&gt;
&lt;br /&gt;
== Dumping stock ==&lt;br /&gt;
&lt;br /&gt;
The stock operating system of a device can be dumped with &amp;lt;code&amp;gt;edl rl backup --skip=userdata --genxml&amp;lt;/code&amp;gt;. This will dump every partition other than &amp;lt;code&amp;gt;userdata&amp;lt;/code&amp;gt; to a folder named &amp;lt;code&amp;gt;backup&amp;lt;/code&amp;gt;, and generate an XML file.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(command adapted from [[pmos:ZTE Axon 7 (zte-axon7)|here]])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Bootloader unlocking ==&lt;br /&gt;
&lt;br /&gt;
Some devices&#039; bootloaders can be unlocked using EDL mode, by editing the &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; partition.&lt;br /&gt;
&lt;br /&gt;
First of all, &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; must be dumped with &amp;lt;code&amp;gt;edl r devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Afterwards, the resulting &amp;lt;code&amp;gt;devinfo.bin&amp;lt;/code&amp;gt; should be opened in a hex editor. The partition should have the magic &amp;lt;code&amp;gt;ANDROID-BOOT!&amp;lt;/code&amp;gt; at the beginning, and optionally at other locations. Where it occurs, replace this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
00|00 00 00 00 00 00 00|00|00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
With this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
01|00 00 00 00 00 00 00|01|00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lastly, save the file, and flash it with &amp;lt;code&amp;gt;edl w devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(adapted from [[xda:bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/|this]] XDA thread)&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=43</id>
		<title>User:Chipmunk</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=43"/>
		<updated>2026-03-09T02:55:00Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.&lt;br /&gt;
&lt;br /&gt;
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
Some things I aim to do eventually:&lt;br /&gt;
* Reverse engineer Samsung&#039;s reactivation lock (&amp;lt;code&amp;gt;libterrier.so&amp;lt;/code&amp;gt;?) and document it (that&#039;s where the &#039;obscure&#039; in &#039;Somewhat Obscure Computing&#039; comes from - I doubt this feature is well documented!) &#039;&#039;(some reversing work done)&#039;&#039;.&lt;br /&gt;
* Use [https://i.blackhat.com/USA-20/Wednesday/us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Exploiting-Samsung-Secure-Boot.pdf an exploit] to tethered unlock my Galaxy J3 Prime, Galaxy J7 Prime and/or my Galaxy J3 Orbit (if possible) (also document the &amp;lt;code&amp;gt;steady&amp;lt;/code&amp;gt; partition on the wiki) ([https://code.chipmunk.land/chipmunkmc/osmium.git done] except for steady).&lt;br /&gt;
* Port an EFI implementation to an x86 phone (Asus Z00D).&lt;br /&gt;
* Write a tool to &#039;&#039;reliably&#039;&#039; exploit [[wikipedia:Dirty Cow|Dirty Cow]], preferably &#039;&#039;without&#039;&#039; touching &amp;lt;code&amp;gt;/system&amp;lt;/code&amp;gt; and escalating to the &#039;&#039;init&#039;&#039; context (for legacy devices of course) (also, can I easily write process memory? I suppose I will find out).&lt;br /&gt;
* Look into unlock methods for various phones... (I own too many).&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=42</id>
		<title>User:Chipmunk</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=42"/>
		<updated>2025-10-20T04:13:15Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Update info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.&lt;br /&gt;
&lt;br /&gt;
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024&amp;lt;!-- as of writing this, last year --&amp;gt;, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
Some things I aim to do eventually:&lt;br /&gt;
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my AT&amp;amp;T Galaxy S5.&lt;br /&gt;
* Reverse engineer Samsung&#039;s reactivation lock (&amp;lt;code&amp;gt;libterrier.so&amp;lt;/code&amp;gt;?) and document it (that&#039;s where the &#039;obscure&#039; in &#039;Somewhat Obscure Computing&#039; comes from - I doubt this feature is well documented!) &#039;&#039;(some reversing work done)&#039;&#039;.&lt;br /&gt;
* Use [https://i.blackhat.com/USA-20/Wednesday/us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Exploiting-Samsung-Secure-Boot.pdf an exploit] to tethered unlock my Galaxy J3 Prime, Galaxy J7 Prime and/or my Galaxy J3 Orbit (if possible) (also document the &amp;lt;code&amp;gt;steady&amp;lt;/code&amp;gt; partition on the wiki) (making progress now!).&lt;br /&gt;
* Port an EFI implementation to an x86 phone (Asus Z00D).&lt;br /&gt;
* Write a tool to &#039;&#039;reliably&#039;&#039; exploit [[wikipedia:Dirty Cow|Dirty Cow]], preferably &#039;&#039;without&#039;&#039; touching &amp;lt;code&amp;gt;/system&amp;lt;/code&amp;gt; and escalating to the &#039;&#039;init&#039;&#039; context (for legacy devices of course) (also, can I easily write process memory? I suppose I will find out...).&lt;br /&gt;
* Look into unlock methods for various phones... (I own too many).&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=41</id>
		<title>User:Chipmunk</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=41"/>
		<updated>2025-06-30T04:46:10Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.&lt;br /&gt;
&lt;br /&gt;
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024&amp;lt;!-- as of writing this, last year --&amp;gt;, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
Some things I aim to do eventually:&lt;br /&gt;
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my AT&amp;amp;T Galaxy S5 (currently borrowed), and AT&amp;amp;T Samsung Gear S (vulnerability is questionable due to the different boot image format).&lt;br /&gt;
* Reverse engineer Samsung&#039;s reactivation lock (&amp;lt;code&amp;gt;libterrier.so&amp;lt;/code&amp;gt;?) and document it (that&#039;s where the &#039;obscure&#039; in &#039;Somewhat Obscure Computing&#039; comes from - I doubt this feature is well documented!).&lt;br /&gt;
* Use [https://i.blackhat.com/USA-20/Wednesday/us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Exploiting-Samsung-Secure-Boot.pdf an exploit] to tethered unlock my Galaxy J3 Prime, Galaxy J7 Prime and/or my Galaxy J3 Orbit (if possible) (also document the &amp;lt;code&amp;gt;steady&amp;lt;/code&amp;gt; partition on the wiki).&lt;br /&gt;
* Port an EFI implementation to an x86 phone (Asus Z00D).&lt;br /&gt;
* Write a tool to &#039;&#039;reliably&#039;&#039; exploit [[wikipedia:Dirty Cow|Dirty Cow]], preferably &#039;&#039;without&#039;&#039; touching &amp;lt;code&amp;gt;/system&amp;lt;/code&amp;gt; and escalating to the &#039;&#039;init&#039;&#039; context (for legacy devices of course) (also, can I easily write process memory? I suppose I will find out...).&lt;br /&gt;
* Look into unlock methods for various phones... (I own too many).&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=40</id>
		<title>User:Chipmunk</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=40"/>
		<updated>2025-06-30T04:41:53Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: the phone also checks for a value derived from the steady partition, which appears to be signed&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.&lt;br /&gt;
&lt;br /&gt;
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024&amp;lt;!-- as of writing this, last year --&amp;gt;, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
Some things I aim to do eventually:&lt;br /&gt;
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my AT&amp;amp;T Galaxy S5 (currently borrowed), and AT&amp;amp;T Samsung Gear S (vulnerability is questionable due to the different boot image format).&lt;br /&gt;
* Reverse engineer Samsung&#039;s reactivation lock (&amp;lt;code&amp;gt;libterrier.so&amp;lt;/code&amp;gt;?) and document it (that&#039;s where the &#039;obscure&#039; in &#039;Somewhat Obscure Computing&#039; comes from - I doubt this feature is well documented!).&lt;br /&gt;
* Use [https://i.blackhat.com/USA-20/Wednesday/us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Exploiting-Samsung-Secure-Boot.pdf an exploit] to tethered unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible) (also document the &amp;lt;code&amp;gt;steady&amp;lt;/code&amp;gt; partition on the wiki).&lt;br /&gt;
* Port an EFI implementation to an x86 phone (Asus Z00D).&lt;br /&gt;
* Look into unlock methods for various phones... (I own too many).&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=39</id>
		<title>User:Chipmunk</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=39"/>
		<updated>2025-06-28T18:30:59Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: oops i meant persistent&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.&lt;br /&gt;
&lt;br /&gt;
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024&amp;lt;!-- as of writing this, last year --&amp;gt;, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
Some things I aim to do eventually:&lt;br /&gt;
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my AT&amp;amp;T Galaxy S5 (currently borrowed), and AT&amp;amp;T Samsung Gear S (vulnerability is questionable due to the different boot image format).&lt;br /&gt;
* Reverse engineer Samsung&#039;s reactivation lock (&amp;lt;code&amp;gt;libterrier.so&amp;lt;/code&amp;gt;?) and document it (that&#039;s where the &#039;obscure&#039; in &#039;Somewhat Obscure Computing&#039; comes from - I doubt this feature is well documented!).&lt;br /&gt;
* Use [https://i.blackhat.com/USA-20/Wednesday/us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Exploiting-Samsung-Secure-Boot.pdf an exploit] to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible).&lt;br /&gt;
* Port an EFI implementation to an x86 phone (Asus Z00D).&lt;br /&gt;
* Look into unlock methods for various phones... (I own too many).&lt;br /&gt;
&amp;lt;!-- lol --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=38</id>
		<title>User:Chipmunk</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=38"/>
		<updated>2025-06-28T18:24:34Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: sboot doesnt actually have symbols afaik, it just has lots of logging with format strings with function parameters... also j3 prime seems unlockable via param partition&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.&lt;br /&gt;
&lt;br /&gt;
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024&amp;lt;!-- as of writing this, last year --&amp;gt;, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
Some things I aim to do eventually:&lt;br /&gt;
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my AT&amp;amp;T Galaxy S5 (currently borrowed), and AT&amp;amp;T Samsung Gear S (vulnerability is questionable due to the different boot image format).&lt;br /&gt;
* Reverse engineer Samsung&#039;s reactivation lock (&amp;lt;code&amp;gt;libterrier.so&amp;lt;/code&amp;gt;?) and document it (that&#039;s where the &#039;obscure&#039; in &#039;Somewhat Obscure Computing&#039; comes from - I doubt this feature is well documented!).&lt;br /&gt;
* Use [https://i.blackhat.com/USA-20/Wednesday/us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Exploiting-Samsung-Secure-Boot.pdf an exploit] to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible).&lt;br /&gt;
* Port an EFI implementation to an x86 phone (Asus Z00D).&lt;br /&gt;
* Look into unlock methods for various phones... (I own too many).&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=37</id>
		<title>User:Chipmunk</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=37"/>
		<updated>2025-06-28T01:49:10Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.&lt;br /&gt;
&lt;br /&gt;
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024&amp;lt;!-- as of writing this, last year --&amp;gt;, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
Some things I aim to do eventually:&lt;br /&gt;
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my &amp;lt;s&amp;gt;Verizon Galaxy Core Prime&amp;lt;/s&amp;gt; (probably not vulnerable!), AT&amp;amp;T Galaxy S5, and AT&amp;amp;T Samsung Gear S (vulnerability is questionable due to the different boot image format).&lt;br /&gt;
* Reverse engineer Samsung&#039;s reactivation lock (&amp;lt;code&amp;gt;libterrier.so&amp;lt;/code&amp;gt;?) and document it (that&#039;s where the &#039;obscure&#039; in &#039;Somewhat Obscure Computing&#039; comes from - I doubt this feature is well documented!).&lt;br /&gt;
* Figure out the &#039;sboot&#039; file format, and how the included symbols come into play&lt;br /&gt;
* Use [https://i.blackhat.com/USA-20/Wednesday/us-20-Chao-Breaking-Samsungs-Root-Of-Trust-Exploiting-Samsung-Secure-Boot.pdf an exploit] to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible).&lt;br /&gt;
* Port an EFI implementation to an x86 phone (Asus Z00D).&lt;br /&gt;
* Look into unlock methods for various phones... (I own too many).&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=36</id>
		<title>User:Chipmunk</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=36"/>
		<updated>2025-06-26T18:13:03Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.&lt;br /&gt;
&lt;br /&gt;
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024&amp;lt;!-- as of writing this, last year --&amp;gt;, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
Some things I aim to do eventually:&lt;br /&gt;
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my Verizon Galaxy Core Prime, AT&amp;amp;T Galaxy S5, and AT&amp;amp;T Samsung Gear S.&lt;br /&gt;
* Reverse engineer Samsung&#039;s reactivation lock (&amp;lt;code&amp;gt;libterrier.so&amp;lt;/code&amp;gt;?) and document it (that&#039;s where the &#039;obscure&#039; in &#039;Somewhat Obscure Computing&#039; comes from - I doubt this feature is well documented!).&lt;br /&gt;
* Figure out the &#039;sboot&#039; file format, and how the included symbols come into play&lt;br /&gt;
* Use a particular exploit (forgot the URL) to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible).&lt;br /&gt;
* Port an EFI implementation to an x86 phone (Asus Z00D).&lt;br /&gt;
* Look into unlock methods for various phones... (I own too many).&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=35</id>
		<title>User:Chipmunk</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=User:Chipmunk&amp;diff=35"/>
		<updated>2025-06-26T14:49:04Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Created page with &amp;quot;Hello.  I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.  Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024&amp;lt;!-- as of writing this, last...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hello.&lt;br /&gt;
&lt;br /&gt;
I created this wiki, originally as a place for me to document useful information I find about various hardware. This was actually going to be a personal wiki originally, however I realized the wiki would potentially be much more useful if others could add information. Who knows, maybe someday, it might document high amounts of devices.&lt;br /&gt;
&lt;br /&gt;
Also, I am actually fairly new to the Android device hacking scene. I began looking into it in 2024&amp;lt;!-- as of writing this, last year --&amp;gt;, and have since learned many things. I am also still quite new to low-level programming and reverse engineering.&lt;br /&gt;
&lt;br /&gt;
Things I aim to do eventually:&lt;br /&gt;
* Port [https://github.com/oscardagrach/galaxy_s5_dev_tree_appended_bug galaxy_s5_dev_tree_appended_bug] to my Verizon Galaxy Core Prime, AT&amp;amp;T Galaxy S5, and AT&amp;amp;T Samsung Gear S.&lt;br /&gt;
* Reverse engineer Samsung&#039;s reactivation lock (&amp;lt;code&amp;gt;libterrier.so&amp;lt;/code&amp;gt;?).&lt;br /&gt;
* Use a particular exploit (forgot the URL) to unlock my Galaxy J3 Prime and/or my Galaxy J3 Orbit (if possible).&lt;br /&gt;
* Look into unlock methods for various phones... (I own too many).&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=edl&amp;diff=34</id>
		<title>edl</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=edl&amp;diff=34"/>
		<updated>2025-06-26T14:06:39Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Redirected page to Qualcomm EDL mode&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Qualcomm EDL mode]]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=33</id>
		<title>ZTE Avid 4</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=33"/>
		<updated>2025-06-26T14:05:03Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: lol oops&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;&#039;ZTE Avid 4&#039;&#039;&#039; is an [[Android]] [[handset]] released by [[wikipedia:ZTE|ZTE Corporation]] in 2017. It includes the [[Qualcomm MSM8909]] chipset and has [[Android]] 7.0 preinstalled.&lt;br /&gt;
&amp;lt;!-- TODO: Make an infobox template for devices including name, model, codename, specs, etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== EDL mode ==&lt;br /&gt;
&lt;br /&gt;
[[Qualcomm EDL mode]] can be accessed on this phone easily using &amp;lt;code&amp;gt;adb reboot edl&amp;lt;/code&amp;gt;. The phone uses EMMC storage, and its EDL loader can be obtained [https://github.com/programmer-collection/zte/blob/master/Z855/prog_emmc_firehose_8909.mbn here].&lt;br /&gt;
&amp;lt;!-- [[User:Chipmunk]] dumped the stock firmware of the device at https://etc.chipmunk.land/android/firmware/dumped/ZTE/Z855/Z855_MPCSV1.0.0B15.zip, however the phone&#039;s bootloader was unlocked once, and then relocked before dumping the firmware. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
&lt;br /&gt;
See [[Qualcomm EDL mode#Bootloader unlocking]]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=32</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=32"/>
		<updated>2025-06-26T14:01:50Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a wiki focused on the [[wikipedia:Hacking of consumer_electronics|hacking of consumer electronics]], mostly on mobile computers such as Android handsets.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;s&amp;gt;There is no actual information here though...  &#039;&#039;yet&#039;&#039;&amp;lt;/s&amp;gt; Now there is &#039;&#039;some&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
If enough people care about this wiki (in the future) an IRC channel might be created.&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=31</id>
		<title>Qualcomm EDL mode</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=31"/>
		<updated>2025-06-26T13:59:06Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Qualcomm EDL mode&#039;&#039;&#039; is a boot mode implemented in the [[boot rom]] of devices using [[Qualcomm SoCs]], which includes features such as reading/writing partitions. It can be used for purposes such as unbricking hard-bricked devices, or flashing partitions on devices that lack [[fastboot]] mode or an equivalent.&lt;br /&gt;
&lt;br /&gt;
Various clients for EDL exist, such as Qualcomm&#039;s own QFIL, [https://github.com/linux-msm/qdl qdl], or [https://github.com/bkerler/edl bkerler&#039;s &#039;edl&#039;]. Unless otherwise specified, the wiki will provide instructions using bkerler&#039;s client.&lt;br /&gt;
&lt;br /&gt;
== Dumping stock ==&lt;br /&gt;
&lt;br /&gt;
The stock operating system of a device can be dumped with &amp;lt;code&amp;gt;edl rl backup --skip=userdata --genxml&amp;lt;/code&amp;gt;. This will dump every partition other than &amp;lt;code&amp;gt;userdata&amp;lt;/code&amp;gt; to a folder named &amp;lt;code&amp;gt;backup&amp;lt;/code&amp;gt;, and generate an XML file.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(command adapted from [[pmos:ZTE Axon 7 (zte-axon7)|here]])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Bootloader unlocking ==&lt;br /&gt;
&lt;br /&gt;
Some devices&#039; bootloaders can be unlocked using EDL mode, by editing the &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; partition.&lt;br /&gt;
&lt;br /&gt;
First of all, &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; must be dumped with &amp;lt;code&amp;gt;edl r devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Afterwards, the resulting &amp;lt;code&amp;gt;devinfo.bin&amp;lt;/code&amp;gt; should be opened in a hex editor. The partition should have the magic &amp;lt;code&amp;gt;ANDROID-BOOT!&amp;lt;/code&amp;gt; at the beginning, and optionally at other locations. Where it occurs, replace this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
With this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lastly, save the file, and flash it with &amp;lt;code&amp;gt;edl w devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(adapted from [[xda:bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/|this]] XDA thread)&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=30</id>
		<title>Qualcomm EDL mode</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=30"/>
		<updated>2025-06-26T13:50:23Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Qualcomm EDL mode&#039;&#039;&#039; is a boot mode implemented in the [[boot rom]] of devices using [[Qualcomm SoCs]], which includes features such as reading/writing partitions. It can be used for purposes such as unbricking hard-bricked devices, or flashing partitions on devices that lack [[fastboot]] mode or an equivalent.&lt;br /&gt;
&lt;br /&gt;
Various clients for EDL exist, such as Qualcomm&#039;s own QFIL, [https://github.com/linux-msm/qdl qdl], or [https://github.com/bkerler/edl bkerler&#039;s &#039;edl&#039;]. Unless otherwise specified, the wiki will provide instructions using bkerler&#039;s client.&lt;br /&gt;
&lt;br /&gt;
== Dumping stock ==&lt;br /&gt;
&lt;br /&gt;
The stock operating system of a device can be dumped with &amp;lt;code&amp;gt;edl rl backup --skip=userdata --genxml&amp;lt;/code&amp;gt;. This will dump every partition other than &amp;lt;code&amp;gt;userdata&amp;lt;/code&amp;gt; to a folder named &amp;lt;code&amp;gt;backup&amp;lt;/code&amp;gt;, and generate an XML file.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(command adapted from [[pmos:ZTE Axon 7 (zte-axon7)|here]])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Bootloader unlocking ==&lt;br /&gt;
&lt;br /&gt;
Some devices&#039; bootloaders can be unlocked using EDL mode, by editing the &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; partition.&lt;br /&gt;
&lt;br /&gt;
First of all, &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; must be dumped with &amp;lt;code&amp;gt;edl r devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Afterwards, the resulting &amp;lt;code&amp;gt;devinfo.bin&amp;lt;/code&amp;gt; should be opened in a hex editor. The partition should have the magic &amp;lt;code&amp;gt;ANDROID-BOOT!&amp;lt;/code&amp;gt; at the beginning, and optionally at other locations. Where it occurs, replace this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
With this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lastly, save the file, and flash it with &amp;lt;code&amp;gt;edl w devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(adapted from [https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/ this] XDA thread)&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=29</id>
		<title>Qualcomm EDL mode</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=29"/>
		<updated>2025-06-26T13:40:23Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Qualcomm EDL mode&#039;&#039;&#039; is a boot mode implemented in the [[boot rom]] of devices using [[Qualcomm SoCs]], which includes features such as reading/writing partitions. It can be used for purposes such as unbricking hard-bricked devices, or flashing partitions on devices that lack [[fastboot]] mode or an equivalent.&lt;br /&gt;
&lt;br /&gt;
Various clients for EDL exist, such as Qualcomm&#039;s own QFIL, [https://github.com/linux-msm/qdl qdl], or [https://github.com/bkerler/edl bkerler&#039;s &#039;edl&#039;]. Unless otherwise specified, the wiki will provide instructions using bkerler&#039;s client.&lt;br /&gt;
&lt;br /&gt;
== Dumping stock ==&lt;br /&gt;
&lt;br /&gt;
The stock operating system of a device can be dumped with &amp;lt;code&amp;gt;edl rl backup --skip=userdata --genxml&amp;lt;/code&amp;gt;. This will dump every partition other than &amp;lt;code&amp;gt;userdata&amp;lt;/code&amp;gt; to a folder named &amp;lt;code&amp;gt;backup&amp;lt;/code&amp;gt;, and generate an XML file.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(command adapted from [[pmOS:ZTE Axon 7 (zte-axon7)]])&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Bootloader unlocking ==&lt;br /&gt;
&lt;br /&gt;
Some devices&#039; bootloaders can be unlocked using EDL mode, by editing the &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; partition.&lt;br /&gt;
&lt;br /&gt;
First of all, &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; must be dumped with &amp;lt;code&amp;gt;edl r devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Afterwards, the resulting &amp;lt;code&amp;gt;devinfo.bin&amp;lt;/code&amp;gt; should be opened in a hex editor. The partition should have the magic &amp;lt;code&amp;gt;ANDROID-BOOT!&amp;lt;/code&amp;gt; at the beginning, and optionally at other locations. Where it occurs, replace this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
With this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lastly, save the file, and flash it with &amp;lt;code&amp;gt;edl w devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;(adapted from [https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/ this] XDA thread)&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=28</id>
		<title>ZTE Avid 4</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=28"/>
		<updated>2025-06-26T13:31:09Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;&#039;ZTE Avid 4&#039;&#039;&#039; is an [[Android]] [[handset]] released by [[wikipedia:ZTE|ZTE Corporation]] in 2017. It includes the [[Qualcomm MSM8909]] chipset and has [[Android]] 7.0 preinstalled.&lt;br /&gt;
&amp;lt;!-- TODO: Make an infobox template for devices including name, model, codename, specs, etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== EDL mode ==&lt;br /&gt;
&lt;br /&gt;
[[Qualcomm EDL mode]] can be accessed on this phone easily using &amp;lt;code&amp;gt;adb reboot edl&amp;lt;/code&amp;gt;. The phone uses EMMC storage, and its EDL loader can be obtained [https://github.com/programmer-collection/zte/blob/master/Z855/prog_emmc_firehose_8909.mbn here].&lt;br /&gt;
&amp;lt;!-- [[User:Chipmunk]] dumped the stock firmware of the device at https://etc.chipmunk.land/android/firmware/dumped/ZTE/Z855/Z855_MPCSV1.0.0B15.zip, however the phone&#039;s bootloader was unlocked once, and then relocked before dumping the firmware. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
&lt;br /&gt;
See [[Qualcomm EDL Mode#Bootloader unlocking]]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=27</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=27"/>
		<updated>2025-06-26T13:29:43Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a wiki focused on the [[wikipedia:Hacking of consumer_electronics|hacking of consumer electronics]], mostly on mobile computers such as Android handsets.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;s&amp;gt;There is no actual information here though...  &amp;lt;i&amp;gt;yet&amp;lt;/i&amp;gt;&amp;lt;/s&amp;gt; Now there is &#039;&#039;some&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
If enough people care about this wiki (in the future) an IRC channel might be created.&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=26</id>
		<title>Qualcomm EDL mode</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=26"/>
		<updated>2025-06-26T13:27:22Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Qualcomm EDL mode&#039;&#039;&#039; is a boot mode implemented in the [[boot rom]] of devices using [[Qualcomm SoCs]], which includes features such as reading/writing partitions. It can be used for purposes such as unbricking hard-bricked devices, or flashing partitions on devices that lack [[fastboot]] mode or an equivalent.&lt;br /&gt;
&lt;br /&gt;
Various clients for EDL exist, such as Qualcomm&#039;s own QFIL, [https://github.com/linux-msm/qdl qdl], or [https://github.com/bkerler/edl bkerler&#039;s &#039;edl&#039;]. Unless otherwise specified, the wiki will provide instructions using bkerler&#039;s client.&lt;br /&gt;
&lt;br /&gt;
== Bootloader unlocking ==&lt;br /&gt;
&lt;br /&gt;
Some phones&#039; bootloaders can be unlocked using EDL mode, by editing the &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; partition.&lt;br /&gt;
&lt;br /&gt;
First of all, &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; must be dumped with &amp;lt;code&amp;gt;edl r devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Afterwards, the resulting &amp;lt;code&amp;gt;devinfo.bin&amp;lt;/code&amp;gt; should be opened in a hex editor. The partition should have the magic &amp;lt;code&amp;gt;ANDROID-BOOT!&amp;lt;/code&amp;gt; at the beginning, and optionally at other locations. Where it occurs, replace this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
With this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lastly, save the file, and flash it with &amp;lt;code&amp;gt;edl w devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/ (adapted from this XDA thread)]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=calbee&amp;diff=25</id>
		<title>calbee</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=calbee&amp;diff=25"/>
		<updated>2025-06-26T13:23:00Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Redirected page to ZTE Avid 4&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[ZTE Avid 4]]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Android&amp;diff=24</id>
		<title>Android</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Android&amp;diff=24"/>
		<updated>2025-06-26T03:39:51Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Created page with &amp;quot;Android is an operating system for various types of devices, most famously ARM-based handsets and tablets. It uses a patched version of the Linux kernel.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Android is an operating system for various types of devices, most famously ARM-based handsets and tablets. It uses a patched version of [[Linux|the Linux kernel]].&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=23</id>
		<title>ZTE Avid 4</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=23"/>
		<updated>2025-06-26T03:33:34Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;&#039;ZTE Avid 4&#039;&#039;&#039; is an [[Android]] [[handset]] released in 2017. It includes the [[Qualcomm MSM8909]] chipset and has [[Android]] 7.0 preinstalled.&lt;br /&gt;
&amp;lt;!-- TODO: Make an infobox template for devices including name, model, codename, specs, etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== EDL mode ==&lt;br /&gt;
&lt;br /&gt;
[[Qualcomm EDL mode]] can be accessed on this phone easily using &amp;lt;code&amp;gt;adb reboot edl&amp;lt;/code&amp;gt;. The phone uses EMMC storage, and its EDL loader can be obtained [https://github.com/programmer-collection/zte/blob/master/Z855/prog_emmc_firehose_8909.mbn here].&lt;br /&gt;
&amp;lt;!-- [[User:Chipmunk]] dumped the stock firmware of the device at https://etc.chipmunk.land/android/firmware/dumped/ZTE/Z855/Z855_MPCSV1.0.0B15.zip, however the phone&#039;s bootloader was unlocked once, and then relocked before dumping the firmware. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
&lt;br /&gt;
See [[Qualcomm EDL Mode#Bootloader unlocking]]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=22</id>
		<title>Qualcomm EDL mode</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Qualcomm_EDL_mode&amp;diff=22"/>
		<updated>2025-06-26T03:32:25Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Qualcomm EDL mode&amp;#039;&amp;#039;&amp;#039; is a boot mode implemented in the boot rom of devices using Qualcomm SoCs, which includes features such as reading/writing partitions. It can be used for purposes such as unbricking hard-bricked devices, or flashing partitions on devices that lack fastboot mode or an equivalent.  Various clients for EDL exist, such as Qualcomm&amp;#039;s own QFIL, [https://github.com/linux-msm/qdl qdl], or [https://github.com/bkerler/edl bkerler&amp;#039;s &amp;#039;edl&amp;#039;]. Unles...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Qualcomm EDL mode&#039;&#039;&#039; is a boot mode implemented in the [[boot rom]] of devices using [[Qualcomm SoCs]], which includes features such as reading/writing partitions. It can be used for purposes such as unbricking hard-bricked devices, or flashing partitions on devices that lack [[fastboot]] mode or an equivalent.&lt;br /&gt;
&lt;br /&gt;
Various clients for EDL exist, such as Qualcomm&#039;s own QFIL, [https://github.com/linux-msm/qdl qdl], or [https://github.com/bkerler/edl bkerler&#039;s &#039;edl&#039;]. Unless otherwise specified, the wiki will provide instructions using bkerler&#039;s client.&lt;br /&gt;
&lt;br /&gt;
== Bootloader unlocking ==&lt;br /&gt;
&lt;br /&gt;
Some phones&#039; bootloaders can be unlocked using EDL mode, by editing the &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; partition.&lt;br /&gt;
&lt;br /&gt;
First of all, &amp;lt;code&amp;gt;devinfo&amp;lt;/code&amp;gt; must be dumped with &amp;lt;code&amp;gt;edl r devinfo devinfo.bin&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Afterwards, the resulting &amp;lt;code&amp;gt;devinfo.bin&amp;lt;/code&amp;gt; should be opened in a hex editor. The partition should have the magic &amp;lt;code&amp;gt;ANDROID-BOOT!&amp;lt;/code&amp;gt; at the beginning, and optionally at other locations. Where it occurs, replace this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
With this:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
41 4E 44 52 4F 49 44 2D 42 4F 4F 54 21 00 00 00&lt;br /&gt;
01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lastly, save the file, and flash it with &amp;lt;code&amp;gt;edl w devinfo devinfo.bin&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/ (adapted from this XDA thread)]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=21</id>
		<title>ZTE Avid 4</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=21"/>
		<updated>2025-06-26T03:05:00Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The ZTE Avid 4 is an [[Android]] [[handset]] released in 2017. It includes the [[Qualcomm MSM8909]] chipset and has [[Android]] 7.0 preinstalled.&lt;br /&gt;
&amp;lt;!-- TODO: Make an infobox template for devices including name, model, codename, specs, etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== EDL mode ==&lt;br /&gt;
&lt;br /&gt;
[[Qualcomm EDL mode]] can be accessed on this phone easily using &amp;lt;code&amp;gt;adb reboot edl&amp;lt;/code&amp;gt;. The phone uses EMMC storage, and its EDL loader can be obtained [https://github.com/programmer-collection/zte/blob/master/Z855/prog_emmc_firehose_8909.mbn here].&lt;br /&gt;
&amp;lt;!-- [[User:Chipmunk]] dumped the stock firmware of the device at https://etc.chipmunk.land/android/firmware/dumped/ZTE/Z855/Z855_MPCSV1.0.0B15.zip, however the phone&#039;s bootloader was unlocked once, and then relocked before dumping the firmware. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
&lt;br /&gt;
See [[Qualcomm EDL Mode#Bootloader unlocking]]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=20</id>
		<title>ZTE Avid 4</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=ZTE_Avid_4&amp;diff=20"/>
		<updated>2025-06-26T03:04:49Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Created page with &amp;quot;The ZTE Avid 4 is an Android handset released in 2017. It includes the Qualcomm MSM8909 chipset and has Android 7.0 preinstalled. &amp;lt;!-- TODO: Make an infobox template for devices including name, model, codename, specs, etc --&amp;gt;  == EDL mode ==  Qualcomm EDL mode can be accessed on this phone easily using &amp;lt;code&amp;gt;adb reboot edl&amp;lt;/code&amp;gt;. The phone uses EMMC storage, and its EDL loader can be obtained [https://github.com/programmer-collection/zte/blob/master/...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The ZTE Avid 4 is an [[Android]] [[handset]] released in 2017. It includes the [[Qualcomm MSM8909]] chipset and has [[Android]] 7.0 preinstalled.&lt;br /&gt;
&amp;lt;!-- TODO: Make an infobox template for devices including name, model, codename, specs, etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== EDL mode ==&lt;br /&gt;
&lt;br /&gt;
[[Qualcomm EDL mode]] can be accessed on this phone easily using &amp;lt;code&amp;gt;adb reboot edl&amp;lt;/code&amp;gt;. The phone uses EMMC storage, and its EDL loader can be obtained [https://github.com/programmer-collection/zte/blob/master/Z855/prog_emmc_firehose_8909.mbn here].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[User:Chipmunk]] dumped the stock firmware of the device at https://etc.chipmunk.land/android/firmware/dumped/ZTE/Z855/Z855_MPCSV1.0.0B15.zip, however the phone&#039;s bootloader was unlocked once, and then relocked before dumping the firmware. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unlocking the bootloader ==&lt;br /&gt;
&lt;br /&gt;
See [[Qualcomm EDL Mode#Bootloader unlocking]]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=19</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=19"/>
		<updated>2025-06-14T04:02:04Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a wiki focused on the [[wikipedia:Hacking of consumer_electronics|hacking of consumer electronics]], mostly on mobile computers such as Android handsets.&lt;br /&gt;
&lt;br /&gt;
There is no actual information here though...  &amp;lt;i&amp;gt;yet&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If enough people care about this wiki (in the future) an IRC channel might be created.&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Somewhat_Obscure_Computing:About&amp;diff=18</id>
		<title>Somewhat Obscure Computing:About</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Somewhat_Obscure_Computing:About&amp;diff=18"/>
		<updated>2025-06-14T04:01:41Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This wiki aims to do document information relating to the [[wikipedia:Hacking of consumer electronics|hacking of consumer electronics]], particularly for mobile, embedded, or just unusual computers, in an organized way. This includes information from operating systems available for devices, to technical details on quirks specific to various devices, and even to unlocking bootloaders, bypassing bootloader signature checks, and/or escalating to root privileges on the preinstalled operating system.&lt;br /&gt;
&lt;br /&gt;
I was originally planning on making this a personal wiki, but realized it would likely be more optimal to allow other users to edit its contents.&lt;br /&gt;
&lt;br /&gt;
The name of this wiki is a backronym of SoC, which stands for [[wikipedia:System on a chip|system on a chip]]. This is because this wiki mainly aims to document devices that are based on systems on chips.&lt;br /&gt;
&lt;br /&gt;
Although websites such as [https://xdaforums.com/ XDA Forums] and [https://wiki.postmarketos.org/wiki/Main_Page The postmarketOS Wiki] already serve a similar purpose, the first is forum rather than a wiki, and the second is focused on a specific operating system.&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Somewhat_Obscure_Computing:About&amp;diff=17</id>
		<title>Somewhat Obscure Computing:About</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Somewhat_Obscure_Computing:About&amp;diff=17"/>
		<updated>2025-06-14T04:00:09Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Protected &amp;quot;Somewhat Obscure Computing:About&amp;quot; ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This wiki aims to do document information relating to the [[wikipedia:Hacking of consumer electronics|hacking of consumer electronics]], particularly for mobile computers, in an organized way. This includes information from operating systems available for devices, to technical details on quirks specific to various devices, and even to unlocking bootloaders, bypassing bootloader signature checks, and/or escalating to root privileges on the preinstalled operating system.&lt;br /&gt;
&lt;br /&gt;
The name of this wiki is a backronym of SoC, which stands for [[wikipedia:System on a chip|system on a chip]]. This is because this wiki mainly aims to document devices that are based on systems on chips.&lt;br /&gt;
&lt;br /&gt;
Although websites such as [https://xdaforums.com/ XDA Forums] and [https://wiki.postmarketos.org/wiki/Main_Page The postmarketOS Wiki] already serve a similar purpose, the first is forum rather than a wiki, and the second is focused on a specific operating system.&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=16</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=16"/>
		<updated>2025-06-14T03:59:49Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: remove duplicate wording&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a wiki focused on the [[wikipedia:Hacking of consumer_electronics|hacking of consumer electronics]], particularly mobile computers such as Android handsets.&lt;br /&gt;
&lt;br /&gt;
There is no actual information here though...  &amp;lt;i&amp;gt;yet&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If enough people care about this wiki (in the future) an IRC channel might be created.&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=14</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=14"/>
		<updated>2025-06-13T04:39:05Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a wiki focused on the [[wikipedia:Hacking of consumer_electronics|hacking of consumer electronics]], particularly mobile computers such as Android handsets.&lt;br /&gt;
&lt;br /&gt;
There is no actual information here though...  &amp;lt;i&amp;gt;yet&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If enough people care about this wiki (in the future) an IRC channel might be created in the future.&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=13</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=13"/>
		<updated>2025-06-13T04:36:50Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a wiki focused on the [[wikipedia:Hacking of consumer_electronics|hacking of consumer electronics]], particularly mobile computers such as Android handsets.&lt;br /&gt;
&lt;br /&gt;
There is no actual information here though...  &amp;lt;i&amp;gt;yet&amp;lt;/i&amp;gt;&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Somewhat_Obscure_Computing:About&amp;diff=12</id>
		<title>Somewhat Obscure Computing:About</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Somewhat_Obscure_Computing:About&amp;diff=12"/>
		<updated>2025-06-13T04:33:52Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: fix casing&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This wiki aims to do document information relating to the [[wikipedia:Hacking of consumer electronics|hacking of consumer electronics]], particularly for mobile computers, in an organized way. This includes information from operating systems available for devices, to technical details on quirks specific to various devices, and even to unlocking bootloaders, bypassing bootloader signature checks, and/or escalating to root privileges on the preinstalled operating system.&lt;br /&gt;
&lt;br /&gt;
The name of this wiki is a backronym of SoC, which stands for [[wikipedia:System on a chip|system on a chip]]. This is because this wiki mainly aims to document devices that are based on systems on chips.&lt;br /&gt;
&lt;br /&gt;
Although websites such as [https://xdaforums.com/ XDA Forums] and [https://wiki.postmarketos.org/wiki/Main_Page The postmarketOS Wiki] already serve a similar purpose, the first is forum rather than a wiki, and the second is focused on a specific operating system. The objective of this wiki is to&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Somewhat_Obscure_Computing:About&amp;diff=11</id>
		<title>Somewhat Obscure Computing:About</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Somewhat_Obscure_Computing:About&amp;diff=11"/>
		<updated>2025-06-13T04:33:14Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Created page with &amp;quot;This wiki aims to do document information relating to the hacking of consumer electronics, particularly for mobile computers, in an organized way. This includes information from operating systems available for devices, to technical details on quirks specific to various devices, and even to unlocking bootloaders, bypassing bootloader signature checks, and/or escalating to root privileges on the preinstalled operating system....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This wiki aims to do document information relating to the [[wikipedia:Hacking of consumer electronics|hacking of consumer electronics]], particularly for mobile computers, in an organized way. This includes information from operating systems available for devices, to technical details on quirks specific to various devices, and even to unlocking bootloaders, bypassing bootloader signature checks, and/or escalating to root privileges on the preinstalled operating system.&lt;br /&gt;
&lt;br /&gt;
The name of this wiki is a backronym of SoC, which stands for [[wikipedia:System on a chip|system on a chip]]. This is because this wiki mainly aims to document devices that are based on systems on chips.&lt;br /&gt;
&lt;br /&gt;
Although websites such as [https://xdaforums.com/ XDA Forums] and [https://wiki.postmarketos.org/wiki/Main_Page The PostmarketOS Wiki] already serve a similar purpose, the first is forum rather than a wiki, and the second is focused on a specific operating system. The objective of this wiki is to&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
	<entry>
		<id>https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=7</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://soc.chipmunk.land/index.php?title=Main_Page&amp;diff=7"/>
		<updated>2025-06-13T03:16:05Z</updated>

		<summary type="html">&lt;p&gt;Chipmunk: Protected &amp;quot;Main Page&amp;quot; ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;strong&amp;gt;MediaWiki has been installed.&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
&lt;br /&gt;
== Getting started ==&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Chipmunk</name></author>
	</entry>
</feed>