启动加载程序解锁耻辱墙
Bootloader Unlock Wall of Shame

原始链接: https://github.com/zenfyrdev/bootloader-unlock-wall-of-shame

## 引导程序解锁:日益增长的担忧 许多公司正在日益限制用户解锁设备引导程序的能力——这种做法限制了定制和控制。 这种趋势虽然并非立即对所有人产生影响,但树立了一个令人担忧的先例。 本资源跟踪阻碍引导程序解锁的制造商以及潜在的解决方法。 **制造商根据解锁限制进行分类:** 有些*完全*阻止解锁,有些施加条件(区域、等待期、在线帐户),还有少数提供有限的选择,例如自定义Android Verified Boot密钥。 **运营商锁定的手机**几乎普遍阻止解锁,即使在*合同履行完毕后*也是如此。 本文档详细介绍了用于解锁具有**麒麟、联发科、紫光展锐以及较旧的 Qualcomm/小米**芯片组的设备的特定漏洞和工具。 然而,通用的 Qualcomm 解锁方法仍然难以捉摸。 **至关重要的是,该指南强调谨慎:** 始终优先考虑完全离线解锁流程,并且不要盲目信任任何公司处理您的数据。 针对特定芯片组和工具,提供了资源和进一步信息的链接。

Hacker News 新闻 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 引导程序解锁耻辱墙 (github.com/zenfyrdev) 18 分,thunderbong 发表于 1 小时前 | 隐藏 | 过去 | 收藏 | 1 条评论 Lord-Jobo 发表于 14 分钟前 [–] 难以置信地糟糕。真正拥有你的智能手机的选择越来越少。回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

Banner. A lock and a key on fire on the left and the text 'Bootloader Unlock: Wall of Shame' on the right.

Keeping track of companies that "care about your data 🥺"

Switch to Russian translation

Terrible License CC BY-NC-SA

mirrors

Over the past few years, a suspicious number of companies have started to "take care of your data", aka block/strictly limit your ability to unlock the bootloader on your own devices.

While this may not affect you directly, it sets a bad precedent. You never know what will get the axe next: Shizuku? ADB?

They've already gone after sideloading.

I thought it might be a good idea to keep track of bad companies and workarounds.

If you know of specific details/unlocking methods, please PR them or drop them in the discussions

Caution

Reminder that no matter how nice a company is,
you should not trust them unless their unlock process is 100% offline!

The following manufacturers have made it completely impossible to unlock their devices without a workaround.

Note

Phone brands handle carrier locks differently, so check your device manual or contact support.

Carrier locked devices are the ones you get after making a commitment with a carrier of your choice. This is quite common in North America and (supposedly) allows you to save some money on your device.

As a rule, almost all carrier locked devices do not allow the bootloader to be unlocked. This usually makes sense, as it would allow you to completely bypass the contract. The problem is that many devices still do not allow you to unlock the bootloader even after the carrier lock has been lifted. For more details, see the carriers page.

The following manufacturers allow unlocking under certain conditions, such as region, model, SOC, etc., or require a sacrifice to unlock.

⚠️ Proceed with caution!

The following manufacturers require an online account and/or a waiting period before unlocking.

Custom Android Verified Boot keys is a feature which allows you to run a custom OS with a locked bootloader.

It's rare to see a device which supports custom AVB keys, but some devices can be found here.

Universal SOC-based methods

Kirin 620, 650, 655, 658, 659, 925, 935, 950, 960:
It's possible to unlock using testpoints and PotatoNV (Read the readme)

If you own a MediaTek device exploitable by mtkclient you can unlock the bootloader using that.
If it also happens to be an OPPO/Realme device and you need to access fastboot: lkpatcher (web version)

There's no Universal Qualcomm method, unfortunately.

Although some of these might work for you:

The general exploit:
alephsecurity.com the bootloader unlock section.

Xiaomi Mi A1 and maybe all MSM89** manufactured before 2018:
EDLUnlock

If you own a phone with the Unisoc UMS9620 or older,you can use this exploit to achieve temporary secure boot bypass and persistently unlock bootloader(except some devices with modified uboot) CVE-2022-38694_unlock_bootloader

If you own a phone with the Unisoc UMS312 UMS512 UD710,you can use this exploit to achieve persistently secure boot bypass, which means all firmwares including splloader,uboot can be modified and resigned. CVE-2022-38691_38692

Otherwise, you can also look into this: Spectrum_UnlockBL_Tool
This: xdaforums.com
Or this: subut


联系我们 contact @ memedata.com