From c52fbb98d7cf66511b315e107766cc65e5b20e0e Mon Sep 17 00:00:00 2001 From: melontini <104443436+melontini@users.noreply.github.com> Date: Mon, 31 Jul 2023 12:12:12 +0700 Subject: [PATCH] Moved ZTE --- README.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index dab29ab..7fd1e0a 100644 --- a/README.md +++ b/README.md @@ -65,6 +65,11 @@ July 30th update: the server is still closed with no opening in sight. If you need DeepTesting, try this: https://forum.xda-developers.com/t/unlock-bootloader-help.4425415/post-86777721 +### ZTE + +Old devices (pre Android 8):
+https://forum.xda-developers.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/ + ## Proceed with caution! Reminder that no matter how nice a company is, you should not trust them unless their unlock process is 100% offline. @@ -128,9 +133,6 @@ Although some of these might work for you: The general exploit:
https://alephsecurity.com/2018/01/22/qualcomm-edl-2/ the bootloader unlock section. -Old ZTE devices:
-https://forum.xda-developers.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/ - Xiaomi Mi A1 and maybe all MSM89** manufactured before 2018:
https://github.com/Giovix92/EDLUnlock