Rockbox Development > New Ports

Toshiba Gigabeat T

<< < (2/2)

v1rus:
Hey Lambda.

I happen to have one of these players. If there is anything I can do with mine (tests, etc.) let me know.

most of my "hacking" experience involves arduino based automation of photography rigs, so I imagine I am not much use, but I am just putting it out there.

LambdaCalculus:
Currently, I haven't had very much of a chance at all to sit with the Gigabeat T again and try to do something with it. I work two jobs, have a relationship, am studying, and much more to do.

When I can actually get a little "me" time to sit down, I'll work on the Gigabeat T. No promises until then.

So in short, no more "When will it be done?" questions, please.

v1rus:
Hey, the last thing I mean to do was rush you. I was just checking if you might have had some grunt work I could help with.

Take your time. I am in the same boat as you with regards to my free time. It's rough.

In the mean time I will try to get my hands on an arm chip and poke at it.

LambdaCalculus:

--- Quote from: v1rus on October 17, 2009, 07:43:46 AM ---In the mean time I will try to get my hands on an arm chip and poke at it.

--- End quote ---

The first and foremost thing that needs to be done is to see if the same (or a similar) digital signature exploit is present on the T's firmware. As I stated before, there was a signature exploit on the S's firmware that allowed us to inject custom code, and from earlier findings, there may be one as well on the T, but I haven't had much time to go over my disassembly of the T's firmware in order to confirm it.

If someone wants to help out by doing an arm-elf-objdump of the T firmware and going through it, please do. I'll do the same when I can actually sit down and do so.

Navigation

[0] Message Index

[*] Previous page

Go to full version