After agreeing to their software terms, I think that might be a good way to be sued on top of having your work taken down. You'd probably have to be completely disconnected from the company and do electrical signal analysis and computer forensics to see what the software is doing without tearing it apart. If you find a copy of it online and never open it up or agree to any terms, I'm guessing that might be a grey area.
I like what you do, but honestly I would love to see more firmware analysis / linux stuff / reverse engineering, than hardware related thing. (I'm a hw guy) Thanks.
I am really glad i encountered your channel. Love your content and learned a lot. Your videos have exactly the right pace. Just wanna say thanks! Please keep it up.
Definitely anti counterfeit device. I have serviced BMWs for over 30 years and they have a ton of computers. I have all kinds of diagnostic equipment from stand alone tools to programs on my laptop. A couple of them requires a usb key that was supplied with the software has to be plugged in in order to make it work.
@@derrekvanee4567 Reversing their broken software and protocol would be a huge time sink and at the end of the day it will benefit them. I won't be contributing to companies running deprecated blackboxes.
The software making VM checks is weird to. Makes me wonder if it also does some checks if it's being debugged and doing some sketchy stuff. Anyways, there are ways to at least try to circumvent the vm checks. Eric Parker has a video on that, setting up a VMWare VM he uses when analyzing malware
You wont have any luck with that. Pretty sure the software is running behind Themida, good luck circumventing that. People use that to secure their ransomware-clients. @@MohmdSy5
Ive ran into multiple different diagnostic software (for trucks) that will not run in VMs without extra work. But I only ran into that issue while trying to reverse engineer lol
bro will this "proprietary flasher box" meme ever die? I remember purchasing several similar boxes from a thrift store, which were meant to unlock older GSM phones. However, to my surprise, when I got home, I discovered that they all require a connection to a server just to even launch the software. Unfortunately, it appears that the servers have been dead for quite some time. real shame.
Not sure if you care or if it matters, but when you were showing the EMMC device showing as USB mass storage, your Pixel 7a’s serial number was visible in the dmesg log
I would love to see more devices support that UFS memory card you may have heard of that looks kind of like a MicroSD card. I wouldn't be surprised if something better came along by now but I knew about UFS memory cards for a good while. The fact is that there is already UFS storage in phones, just soldered down. Why UFS memory cards don't seem to be used everywhere is a mystery to me. It is as if they suffered the same fate that Thunderbolt nearly did and would have if Apple did not use it. I would say that though Thunderbolt is *NOT* Apple proprietary it may be known for being easier to find on Apple devices.
@@mattbrwn Honestly it surprises me they aren't in everything. I think I even read that it is royalty free. You may still have to pay to get the specs but no royalty to produce devices with it. If I am not mistaken there are very very few devices that use it. Maybe this is a good example of how stubborn people can be when it comes to switching over.
I asked a question and commented once, but you deleted it? Did I do something wrong? I just wanted to know, do you know that the bga162 nand memory for LTE modems can be read or written with these boxes that you introduced?
Android huh.... I wonder what it would take to repurpose one of these to run an alternative ROM, with local Home Assistant support. Is there a repository for these firmware dumps out on the darkweb somewhere? I have a pile of these e-waste spyware ver1 echos around here somewhere.
Thanks for the video Matt, one question though, isn't there supposed to be "UFI Box" instead of "EFI Box"? Not a grammar stickler, just wanted to ask :D . I was thinking to get one of these a while ago, thanks for helping me decide NOT to get one of these! I hate these arbitrary restrictions >:(
Slow down the speed at the power option to make it more stable. A alot of times it helped me. And UFI UFS they don't support UFS 3.1 version except micron brand. Yeah, and the Emmc socket is a crap. Read and write took forever
Im new to this channel and kind of confused. So the type of hacking you do is practically hardware hacking right? What is typically the purpose of this? Just to check weakness and modify the software on board? I'll be scrolling back at some older videos to learn more. This is interesting.
Thanks for this video, I wonder if you have any tool you recommend to extract files from an DiskOnChip G4 flash media storage (having a Windows CE on it)
@@mattbrwn Yeah, it's an older chip, it's a nice one, haven't found a method to reliably extract the data, will probably end up doing some custom work in the end on it.
Time to extract the extractor and get the open source ball rolling on next generation of hardware extractors?… Seems risky to be using proprietary hardware with proprietary crap software…