Rockbox Development > New Ports
Toshiba Gigabeat T
v1rus:
Hey Lambda.
I happen to have one of these players. If there is anything I can do with mine (tests, etc.) let me know.
most of my "hacking" experience involves arduino based automation of photography rigs, so I imagine I am not much use, but I am just putting it out there.
LambdaCalculus:
Currently, I haven't had very much of a chance at all to sit with the Gigabeat T again and try to do something with it. I work two jobs, have a relationship, am studying, and much more to do.
When I can actually get a little "me" time to sit down, I'll work on the Gigabeat T. No promises until then.
So in short, no more "When will it be done?" questions, please.
v1rus:
Hey, the last thing I mean to do was rush you. I was just checking if you might have had some grunt work I could help with.
Take your time. I am in the same boat as you with regards to my free time. It's rough.
In the mean time I will try to get my hands on an arm chip and poke at it.
LambdaCalculus:
--- Quote from: v1rus on October 17, 2009, 07:43:46 AM ---In the mean time I will try to get my hands on an arm chip and poke at it.
--- End quote ---
The first and foremost thing that needs to be done is to see if the same (or a similar) digital signature exploit is present on the T's firmware. As I stated before, there was a signature exploit on the S's firmware that allowed us to inject custom code, and from earlier findings, there may be one as well on the T, but I haven't had much time to go over my disassembly of the T's firmware in order to confirm it.
If someone wants to help out by doing an arm-elf-objdump of the T firmware and going through it, please do. I'll do the same when I can actually sit down and do so.
Navigation
[0] Message Index
[*] Previous page
Go to full version