Google Code Exporter
Google Code Exporter
``` and.. the ios version is 3.1.2 ``` Original comment by `[email protected]` on 29 Aug 2012 at 9:37
``` Did you find an explanation, 'cause I have the same kind of error. !!! Unknown deviceReadId -49aa2814, assuming 1 physical bank /CE, will probably fail And my ios is...
``` This issue was updated by revision 930139479d08. ``` Original comment by `[email protected]` on 28 Oct 2012 at 11:32
``` The last commit should fix the problem, however ios_examiner is still broken for old devices (old VFL/FTL) so you might get other errors. ``` Original comment by `[email protected]` on...
``` Additionally I have built a new custom ramdisk and kernel utilizing the steps/process outlined in the wiki (http://code.google.com/p/iphone-dataprotection/wiki/README) and continue to experience the same outcome: hg clone https://code.google.com/p/iphone-dataprotection/ cd...
``` Try changing this line in ios_examiner.py http://code.google.com/p/iphone-dataprotection/source/browse/python_scripts/ios_ examiner.py#105 from self.prompt = "(%s-%s) %s " % (self.deviceName, self.volname, self.curdir) to self.prompt = "(%s-%s) %s " % (self.deviceName.encode("utf-8"), self.volname, self.curdir) the...
``` Hello, Applying the stated modification to the ios_examiner.py script has resolved this issue, I am again able to upload the custom ramdisk to the target device and utilize the...
``` Thank you, working for me as well! ``` Original comment by `[email protected]` on 22 Sep 2012 at 11:10
``` Hi, may I just add that a similar patch is needer for backup_tool.py as well. I have 2 device backups on my PC, one is parsed fine with backup_tool,...
``` The serial number is in the DEVICEUNIQUEINFO special pages which are stored at the "end" of the NAND. Those pages are encrypted with the metadata key. The code at...