From c52fbb98d7cf66511b315e107766cc65e5b20e0e Mon Sep 17 00:00:00 2001
From: melontini <104443436+melontini@users.noreply.github.com>
Date: Mon, 31 Jul 2023 12:12:12 +0700
Subject: [PATCH] Moved ZTE
---
README.md | 8 +++++---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/README.md b/README.md
index dab29ab..7fd1e0a 100644
--- a/README.md
+++ b/README.md
@@ -65,6 +65,11 @@ July 30th update: the server is still closed with no opening in sight.
If you need DeepTesting, try this: https://forum.xda-developers.com/t/unlock-bootloader-help.4425415/post-86777721
+### ZTE
+
+Old devices (pre Android 8):
+https://forum.xda-developers.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/
+
## Proceed with caution!
Reminder that no matter how nice a company is, you should not trust them unless their unlock process is 100% offline.
@@ -128,9 +133,6 @@ Although some of these might work for you:
The general exploit:
https://alephsecurity.com/2018/01/22/qualcomm-edl-2/ the bootloader unlock section.
-Old ZTE devices:
-https://forum.xda-developers.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/
-
Xiaomi Mi A1 and maybe all MSM89** manufactured before 2018:
https://github.com/Giovix92/EDLUnlock