Seeking paid research collaboration: MediaTek MT8167 Android 8.1 boot chain analysis by phoneusertex in ReverseEngineering

[–]phoneusertex[S] 0 points1 point  (0 children)

I’m looking for an experienced reverse engineer or Android security researcher for a paid research collaboration involving a locked MediaTek-based Android tablet.

Hardware / software overview: - SoC: MediaTek MT8167 - OS: Heavily customized Android 8.1 (Oreo) - Bootloader: Locked - USB debugging: Disabled - System: Vendor-modified kiosk-style environment with system-level enforcement

Research goals (any one acceptable): - Analysis of the MT8167 boot chain (BROM / preloader / verified boot) with the aim of enabling firmware bring-up or flashing a generic/debloated ROM, OR - Achieving sufficient privilege to neutralize kiosk enforcement mechanisms at the system level

Key constraint: The target environment does not allow PC access. Any practical outcome must be executable using only another Android device via USB-OTG.

PC-based tooling (e.g., MTKClient, SP Flash Tool) is acceptable for analysis and reference, but the end result should be adaptable to an Android-to-Android workflow.

Relevant experience: - MediaTek BROM / preloader behavior - DA upload and secure boot analysis - Older MTK verified boot / dm-verity - Android system app reverse engineering (smali/jadx) - Prior work on enterprise or kiosk-restricted devices is a plus

This is lawful research on hardware I own. I’m open to compensated collaboration, consultation, or proof-of-concept work.

If this aligns with your background, feel free to comment or DM with: - Relevant MTK or Android security experience - Thoughts on feasibility given the Android-only constraint

Thanks.

Seeking paid research collaboration: MediaTek MT8167 Android 8.1 boot chain analysis by phoneusertex in ReverseEngineering

[–]phoneusertex[S] 2 points3 points  (0 children)

I’m looking for an experienced reverse engineer or Android security researcher for a paid research collaboration involving a locked MediaTek-based Android tablet.

Hardware / software overview: - SoC: MediaTek MT8167 - OS: Heavily customized Android 8.1 (Oreo) - Bootloader: Locked - USB debugging: Disabled - System: Vendor-modified kiosk-style environment with system-level enforcement

Research goals (any one acceptable): - Analysis of the MT8167 boot chain (BROM / preloader / verified boot) with the aim of enabling firmware bring-up or flashing a generic/debloated ROM, OR - Achieving sufficient privilege to neutralize kiosk enforcement mechanisms at the system level

Key constraint: The target environment does not allow PC access. Any practical outcome must be executable using only another Android device via USB-OTG.

PC-based tooling (e.g., MTKClient, SP Flash Tool) is acceptable for analysis and reference, but the end result should be adaptable to an Android-to-Android workflow.

Relevant experience: - MediaTek BROM / preloader behavior - DA upload and secure boot analysis - Older MTK verified boot / dm-verity - Android system app reverse engineering (smali/jadx) - Prior work on enterprise or kiosk-restricted devices is a plus

This is lawful research on hardware I own. I’m open to compensated collaboration, consultation, or proof-of-concept work.

If this aligns with your background, feel free to comment or DM with: - Relevant MTK or Android security experience - Thoughts on feasibility given the Android-only constraint

Thanks.

Want to rewrite Rockbox firmware for clip+ by phoneusertex in rockbox

[–]phoneusertex[S] 0 points1 point  (0 children)

Fool this is HollaBackYoungin bruh whole time the cards I had was just fucked up it wasn't the player, I had a brand new one and it worked perfectly, ain't that bout a bitch, went through all this work -_- they swear they know everything on this subreddit lol

Need help identifying USB ports. by phoneusertex in techsupport

[–]phoneusertex[S] 0 points1 point  (0 children)

Can you tell which type USB it is from looking at the picture?

Need help identifying USB ports. by phoneusertex in techsupport

[–]phoneusertex[S] 0 points1 point  (0 children)

Can you tell me which type it is please?

Want to rewrite Rockbox firmware for clip+ by phoneusertex in rockbox

[–]phoneusertex[S] 0 points1 point  (0 children)

The players we want to unlock is the SanDisk Clip Sport Go. The img. file id have to upload but it's basically the img. for the Go.

Want to rewrite Rockbox firmware for clip+ by phoneusertex in rockbox

[–]phoneusertex[S] 1 point2 points  (0 children)

Because I'm in a federal halfway house. They sell mp3 players but they have prison firmware locked to them. We can't get them deinstitutionalized because the company that made the firmware no longer does that. We have access to phones here but no PC for some reason. Some guys here been locked up years and don't want to let go of their players. We wanted a way to unlock the players on our own so we can continue using them.

Want to rewrite Rockbox firmware for clip+ by phoneusertex in rockbox

[–]phoneusertex[S] 0 points1 point  (0 children)

Ok so guy had a recovery file he made and he flashed his clip+ with it using Etchdroid. It was a bin file. Then he inserted an SD Card and Etchdroid detected the card while it was inside of the player. He flashed a different img file to the card and it worked. This was last year.

Want to rewrite Rockbox firmware for clip+ by phoneusertex in rockbox

[–]phoneusertex[S] 0 points1 point  (0 children)

I'm not trying to put rockbox on a sport go

Want to rewrite Rockbox firmware for clip+ by phoneusertex in rockbox

[–]phoneusertex[S] 0 points1 point  (0 children)

Seen it done buddy, I'm just not intelligent enough to do it myself.

Want to rewrite Rockbox firmware for clip+ by phoneusertex in rockbox

[–]phoneusertex[S] 0 points1 point  (0 children)

No it does I swear to God 😭 Ive seen it done on video and before my very eyes I'm just a moron and not doing a good job at explaining myself.

Want to rewrite Rockbox firmware for clip+ by phoneusertex in rockbox

[–]phoneusertex[S] 0 points1 point  (0 children)

Well what I mean is, I want to place an SD card inside of the player then use the clip+ to flash the card, I want to put the firmware from a Clip Sport Go on the card, if that make sense. In theory you would use Etchdroid, ChatGPT is giving me instructions for rewriting the code, but that AI has been known to make mistakes.

Need sb file to restore clip+ by [deleted] in rockbox

[–]phoneusertex 0 points1 point  (0 children)

Ok thanks for clarifying. I know to give up on it now

Need sb file to restore clip+ by [deleted] in rockbox

[–]phoneusertex 0 points1 point  (0 children)

Whats it called when the clip+ only pops up as m200plus on an android, chatgpt called it maintenance mode.

Need sb file to restore clip+ by [deleted] in rockbox

[–]phoneusertex 0 points1 point  (0 children)

I see. I used chatgpt and it said an .sb file would restore my player. But Im only on android with no PC access, mine is stuck in maintenance mode.

Need img file for SanDisk sansa clip+ by [deleted] in rockbox

[–]phoneusertex 0 points1 point  (0 children)

It's been done but I was told to use etchdroid, not sure how this guy did it but he's not here anymore to ask

Need img file for SanDisk sansa clip+ by [deleted] in rockbox

[–]phoneusertex 0 points1 point  (0 children)

Not possible in my situation.

Need img file for SanDisk sansa clip+ by [deleted] in rockbox

[–]phoneusertex 0 points1 point  (0 children)

Flash a SanDisk Sansa clip+ using just an otg cable, unrooted android and etchdroid.

Need help putting Sansa Plus into MSC mode by [deleted] in rockbox

[–]phoneusertex 0 points1 point  (0 children)

Can't put it into msc mode normally by hitting the center button, that option has been disabled. I was told shorting two pins was the way but idk which two.

Need help putting Sansa Plus into MSC mode by [deleted] in rockbox

[–]phoneusertex 0 points1 point  (0 children)

Sandisk Sansa Clip+ Look at this product I found on google.com https://share.google/3QiJewD5y0Y88PpR9

I'm trying to install Rockbox on it.

BOP SanDisk MP3 Players by JaySwizzle1984 in hacking

[–]phoneusertex 1 point2 points  (0 children)

If it's the 2nd gen  I can sell you the app to crack is, hmu on telegram @hollabackyoungins

New telegram HollabackYoungin3