From 095c7a3f024e43b96f5c4eebddffa65ce854b88f Mon Sep 17 00:00:00 2001 From: HappyZ Date: Fri, 16 Nov 2018 00:57:49 -0600 Subject: [PATCH 1/3] Update README.md --- README.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index e98f3dc..8748f2c 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,9 @@ We likely have some fun stuff here! # 0x1 Special Thanks -Great thanks to anonymous contributors all over the Internet even though you guys might not know you helped. +Greatly thank +* [shankerzhiwu and his/her friend at XDA](https://forum.xda-developers.com/general/help/idea-to-root-sonys-e-reader-dpt-rp1-t3654725/post78153143) who made the USB hack possible +* [octavianx](https://github.com/octavianx/Unpack-and-rebuild-the-DPT-RP1-upgrade-firmware) who shreds light on the hack # 0x2 What does DPT stand for? @@ -57,10 +59,6 @@ Now we can enter diagnosis mode thanks to shankerzhiwu and his/her friend, we ca - [ ] ~~Web interface testmode~~ (fails as we do not have `auth nonce` and required private key `K_PRIV_DT`) - [ ] ~~Official app~~ (fails as the firmware updates purely rely on web interface API) -# 0x4 References - -Not gonna reveal those details but let's say there is a place named Google, and there is another place named GitHub. - # 0xF Mission Impossible Well, to bypass pkg validation, you can also try to decrypt the RSA key and generate corresponding private key, when we actually have enough computation resources and time to do it lol: From dddc43d59ef3685e4a901738f4c54bf19ebc41cc Mon Sep 17 00:00:00 2001 From: HappyZ Date: Fri, 16 Nov 2018 00:58:11 -0600 Subject: [PATCH 2/3] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 8748f2c..e4fafde 100644 --- a/README.md +++ b/README.md @@ -6,7 +6,7 @@ We likely have some fun stuff here! Greatly thank * [shankerzhiwu and his/her friend at XDA](https://forum.xda-developers.com/general/help/idea-to-root-sonys-e-reader-dpt-rp1-t3654725/post78153143) who made the USB hack possible -* [octavianx](https://github.com/octavianx/Unpack-and-rebuild-the-DPT-RP1-upgrade-firmware) who shreds light on the hack +* [octavianx](https://github.com/octavianx/Unpack-and-rebuild-the-DPT-RP1-upgrade-firmware) who sheds light on the hack # 0x2 What does DPT stand for? From 87dbb59577a1727188ad4bfacfe51202192c8731 Mon Sep 17 00:00:00 2001 From: HappyZ Date: Fri, 16 Nov 2018 00:59:37 -0600 Subject: [PATCH 3/3] Update README.md --- README.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index e4fafde..8bd80b6 100644 --- a/README.md +++ b/README.md @@ -10,11 +10,7 @@ Greatly thank # 0x2 What does DPT stand for? -I will keep this as a secret for now. - -But if you read my code and realize what it is about, ping me at yz at 9pm.me and we may work on this together. Or, you can donate a cup of coffee to encourage this work. - -[![Donate](https://img.shields.io/badge/Donate-PayPal-green.svg)](https://www.paypal.com/cgi-bin/webscr?cmd=_donations&business=zhuyanzi@gmail.com&item_name=A+Cup+Of+Coffee&item_number=Thank+You¤cy_code=USD) +[cough cough] If you don't know what's DPT you won't need this. # 0x3 Tools @@ -59,6 +55,8 @@ Now we can enter diagnosis mode thanks to shankerzhiwu and his/her friend, we ca - [ ] ~~Web interface testmode~~ (fails as we do not have `auth nonce` and required private key `K_PRIV_DT`) - [ ] ~~Official app~~ (fails as the firmware updates purely rely on web interface API) +[![Donate](https://img.shields.io/badge/Donate-PayPal-green.svg)](https://www.paypal.com/cgi-bin/webscr?cmd=_donations&business=zhuyanzi@gmail.com&item_name=A+Cup+Of+Coffee&item_number=Thank+You¤cy_code=USD) + # 0xF Mission Impossible Well, to bypass pkg validation, you can also try to decrypt the RSA key and generate corresponding private key, when we actually have enough computation resources and time to do it lol: