implemented nano3g wtf defanger for full cfw #8
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
the iPod n3g does not use an EFI WTF like everything else, it just uses a flat binary that relies rather heavily on the bootrom. by changing the condition on two instructions, we can skip the entire sig check and boot into any modified image we send it.
tested on an n3g by decrypting FIRMWARE.x1242.RELEASE.dfu, modifying it so the "do not remove" icon is different, and then sending it using this method and observing that the change did, in fact, take.