View Single Post
  #38 (permalink)  
Old 01-12-2011, 11:24 AM
BooDaddy's Avatar
BooDaddy
Linux Administrator
Offline
Threadstarter
Location: gigahype.net
 
Join Date: Sep 2007
Posts: 1,078
Reputation: 840
BooDaddy knows their stuffBooDaddy knows their stuffBooDaddy knows their stuffBooDaddy knows their stuffBooDaddy knows their stuffBooDaddy knows their stuffBooDaddy knows their stuff
Mentioned: 0 Post(s)
Tagged: 0 Thread(s)
Re: Good way to backup WiMax RSA keys. Works before Rooting, and on stock OEM Roms.

Quote:
Originally Posted by iknowsquat View Post
OK, WHICH amon
On 2.2.1 when you select backup the last step will bring up a list of options:
boot
system
cache
wimax
etc....

Just select wimax.

btw your RSA keys ARE in the wimax.img created with amon (and I assume CWM)

In amonRA's thread he lists the same manual restore method as listed here by using adb with the wimax.img on the root of the SD card.
Again, not challenging the OP but just thought a lot of users would find the wimax backup in recovery a simpler option.

Completely understand iknowsquat. When I originally wrote the post, there wasnt any recoveries backing up the keys at all, so I wanted to put something out there just in case.

There are ways to restore the keys if you used my method, but I am not 100% it should be mentioned. Likewise, I am not sure even mentioning using recovery to restore WiMax keys is "legal". The reason being is that it is essence exactly like cloning an ESN. It would be really simple to clone someones WiMax info to a "bad" phone and just use the thing as a wifi hotspot for 4G or what have you. If you are familiar with Linux command line, you can figure out how to write the keys back to your phone. There are several methods, but they usually involve using mtd-utils, cat, sed, and even dd.

But, for now, I am going to modify my original thread to point people to start using the new recoveries as this will be the simplest method going forward. If you have used my method, and need to restore your keys, you can use the new clockwork or Amon_ra recoveries in conjunction with the key dump you made. Again, I won't go into details because I dont want to possibly violate any forum rules about device cloning, but it can be done if you learn the following: cat, sed, dd, and mtd-utils. If you have a linux machine, just use the man pages on each of these commands and you can figure it out easily
__________________

Yup, Thats the actual speeds I get from my 1U production server
If my posts have been helpful in any way, please click the "Thanks" button --------------------------------> ↓ ↓ ↓ ↓ ↓ ↓ ↓ ↓
Reply With Quote