[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/workshop mal.rec
From: |
Therese Godefroy |
Subject: |
www/proprietary/workshop mal.rec |
Date: |
Sat, 26 Nov 2022 05:15:46 -0500 (EST) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 22/11/26 05:15:46
Modified files:
proprietary/workshop: mal.rec
Log message:
Xiaomi bootloader unlocking (RT #1880622).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.475&r2=1.476
Patches:
Index: mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.475
retrieving revision 1.476
diff -u -b -r1.475 -r1.476
--- mal.rec 26 Nov 2022 10:13:25 -0000 1.475
+++ mal.rec 26 Nov 2022 10:15:46 -0000 1.476
@@ -24,6 +24,23 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2022-11-26
+Id: 202210110
+RT: 1880622
+PubDate: 2022-10-11
+Target: proprietary-back-doors.html install-delete
+Target: proprietary-tyrants.html proprietary-tyrants
+Keywords: bootloader
+Blurb: <p>Xiaomi provides a tool to <a
++ href="https://www.guidetoroot.com/unlock-bootloader-on-any-xiaomi-phones/">
++ unlock the bootloader of Xiaomi smartphones and tablets</a>,
++ but this requires creating an account on the company's servers,
++ i.e. providing your phone number. This is the price you have to pay
++ for “legally” running a free software operating system
++ on Xiaomi devices. But the manufacturer retains complete control of
++ unlocked devices through a backdoor in the bootloader—the same
++ backdoor that was remotely used to unlock it.</p>
+
Added: 2022-09-21
Id: 202209000
RT: 1865814