Arkady
Arkady
@ivanfor No, you can't. Request to api.eu.xiaoyi.com, as well as other Chinese addresses requests the "dispatch" module.
> The only solution is to bind the whole folder. > > ``` > mkdir /tmp/etc > cp -R /etc/* /tmp/etc > mount --bind /tmp/etc /etc > echo "127.0.0.1 api.eu.xiaoyi.com"...
DIspatch constantly sends your network information with passwords to China. I don't like it. The camera was created for espionage purposes. It would be great if you completely remove this...
@Catfriend1 Yes, I saw it in wireshark. The SSID and password were forwarded there. Why would they do that?!
The situation with "RTSP stopped working once I block internet access of the camera" reminds me how web.whatsapp.com stopped working once I block internet access of the smartphone. And this...
Yes, only this algorithm works on CN17, outdoor, etc. with Hi3518ev200. https://github.com/npetrovski/yi-home-led/tree/master/src
I think I found a way. In my opinion, you need to put the wpa_supplicant.conf file on the sd in the Factory folder. Tomorrow I'll take the camera to visit...
Perfectly work. Don't forget to edit "Your_WiFi" and "Your_password"!!! [wifi_on_sd.zip](https://github.com/roleoroleo/yi-hack-Allwinner/files/6323138/wifi_on_sd.zip)
This feature has nothing to do with the hack. Don't interfere with the hack here. This is an option of the camera manufacturer. So it is provided, if there is...
> I don't know this model. > Is CN17 based on hisilicon chip? > If yes you could find the answer here https://github.com/alienatedsec/yi-hack-v4 Model: ARM926EJ-S hi3518ev200