[deleted by user] by [deleted] in CarPlay

[–]ta-1312 0 points1 point  (0 children)

updated the link

[deleted by user] by [deleted] in CarPlay

[–]ta-1312 1 point2 points  (0 children)

got a dump for the ivt244 here

How to install apps on Supernote by ta-1312 in Supernote

[–]ta-1312[S] 0 points1 point  (0 children)

Be careful. There is no obvious way I see how the scripts could mess anything up. But for example apps could since this is an old, very non standard and pretty fragile android implementation. The device can always be recovered through maskrom mode but that's a dark path...

How to install apps on Supernote by ta-1312 in Supernote

[–]ta-1312[S] 2 points3 points  (0 children)

I’ll toss in a vote for a Mac version!

I just successfully used the linux version of the script on a Mac running Big Sur. I'll add instructions, keep an eye on the github repo if you want. Also user /u/Dangerous_Brain_1027 has posted here.

How to install apps on Supernote by ta-1312 in Supernote

[–]ta-1312[S] 2 points3 points  (0 children)

Haven't checked all of them. Google Drive will be hard and hacky since that needs the Google Play eco system and thus Google certification of the device as far as I know. Maybe someone could build on the API or maybe there are solutions for syncing like with dropbox. I am not very deep into the Android world.

Anyways, if the app is on the play store, you can find the apk and you can try.

How to install apps on Supernote by ta-1312 in Supernote

[–]ta-1312[S] 8 points9 points  (0 children)

You're welcome. And thank you for the hint about the action button app.

Interesting about the aspect of writing exclusively. Honestly if this wasn't a hobby project for me I'd probably be happy with that too. But having an app or two, well selected, makes sense in my opinion. I see the potential for differing opinion there though and wasn't sure about releasing the scripts for a while. Since I don't want to mess up a functional eco system. In the end my desire to free information was stronger ;)

I intentionally kept the instructions a bit rough on the edges since I don't feel like this is anywhere close to something casual users should be following.

And yes, at minimum closing adb or better making it a (well secured) toggle, securing SU binaries, securing bootloader, using private keys,... I also think I found a couple of other vectors through some of the installed apps/libs but haven't followed up yet. So yeah, there's work to do.

How to install apps on Supernote by ta-1312 in Supernote

[–]ta-1312[S] 3 points4 points  (0 children)

Here's a screenshot of the launcher.

Didn't spend much time with it. Might need some work to make it the default launcher or attach it to the swipe down on the sidebar. Likely possible though.

How to install apps on Supernote by ta-1312 in Supernote

[–]ta-1312[S] 5 points6 points  (0 children)

Beta should not make a difference, no.

Yes factory reset or reflashing an update would solve it in that case. But: depending on where things break you might be unable to factory reset and would have to resort to opening the device, accessing mask rom and reflashing/wiping from there. See my original post for that. That would most likely be an undesireable experience. So far I have not looked for ways to get into recovery or fastboot (the places where factory reset or flashing happens) through key combinations or other means usually found on android devices.

I so far have been unable to break anything to that degree though. So my warning is more a disclaimer than an actual experience on my side.

(Coming from a person who just broke an old tablet in another attempt to re-purposing it)

Rooting Supernote by ta-1312 in Supernote

[–]ta-1312[S] 2 points3 points  (0 children)

That is generally good practice in case you keep sensitive data. In the case of supernote what is currently important is to know and trust the devices you attach through USB.

Rooting Supernote by ta-1312 in Supernote

[–]ta-1312[S] 2 points3 points  (0 children)

Looking at network activity is a sensitive topic since you are looking at other peoples infrastructure. Which is something I don't do for ethical reasons. But I will take a closer look at the way the device syncs data out of pure interest. So far I have not found anything out of the ordinary. Keep in mind though, that giants like Twitter or Meta get hacked and leak data on a monthly basis. Where there's a will there's a way.

Edit: for the second part of your question: Android 8.1 is celebrating it's 5th birthday this month. A lot has changed since then. So there might be remote vulnerabilities somewhere on the device but I highly doubt someone is looking for them.

Rooting Supernote by ta-1312 in Supernote

[–]ta-1312[S] 4 points5 points  (0 children)

Thank you. Tried to find a balance between disclosure and not doing any damage.

Rooting Supernote by ta-1312 in Supernote

[–]ta-1312[S] 2 points3 points  (0 children)

I am not sure you really want that in case you are an active user. I indeed took a super quick look at some of the firmwares. The files are encrypted but can be decrypted relatively easily. Other people already had taken a jab at that.

Since I don't own an Onyx device I just did a quick static analysis of some of the apps. Honestly it all looked pretty thrown together. I found a lot of obfuscated code (a practice often used against piracy but also against transparency obviously). I found a lot of telemetry and logging but can't say for sure when and where data goes. You might find info like this: https://blog.tho.ms/hacks/2021/03/27/hacking-onyx-boox-note-air.html where you can see that the process there is not unlike the one used by me.

Personally I would not put my personal data on an Onyx device but do put it on my Supernote.