Vivo Y19 New Security 2022.02.01 Vivo Y19 Android 12 New Security 2022.02.01 Not Work Please Team Update MTK Tool.Thanks Operation : Reset Settings/Format FS [ v2.34 ] Mode : FRP [ RESET PROTECTION ] 1. Make sure device is powered off. Power off, if need. Wait 20 seconds after 2. Insert USB cable in phone Waiting for device connection ... PTFN : MediaTek PreLoader USB VCOM_V1632 (Android) (COM18) MODE : PRELOADER PORT PORT : 18 Waiting BOOT ack ... PRELOADER : ACK confirm FAIL! BROM : Init BROM BROM init passed! CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000 CODE : Talbot TYPE : MODERN [RAPHAEL] BROM : SecLevel : 0x00000005 BROM : SecMode : SBC+SDA BROM : BROM|BL : 0xFF|0x03 BROM : PRELOADER PORT AGENT : 0_base : BASE_v2112 | Manual : Disabled AGENT : Look for suitable BootChain in DA ... AGENT : MTK_AllInOne_DA.bin AGENT : Found MT6768 AGENT : MTK_DOWNLOAD_AGENT BROM : Sending 1st DA ... BROM : Reset Interface! PTFN : MediaTek PreLoader USB VCOM_V1632 (Android) (COM18) MODE : PRELOADER PORT PORT : 18 Waiting BOOT ack ... PRELOADER : ACK confirmed! BROM : Init BROM BROM init passed! CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000 CODE : Talbot TYPE : MODERN [RAPHAEL] BROM : SecLevel : 0x00000005 BROM : SecMode : SBC+SDA BROM : BROM|BL : 0xFF|0x03 BROM : PRELOADER PORT AGENT : 0_base : BASE_v2112 | Manual : Disabled AGENT : Look for suitable BootChain in DA ... AGENT : MTK_AllInOne_DA.bin AGENT : Found MT6768 AGENT : MTK_DOWNLOAD_AGENT BROM : Sending 1st DA ... BROM : 0x00007024 : DA SEND ERROR! ERROR : SECURE BOOT : SELECTED DA NOT SUPPORTED IN CURRENT DEVICE STATE! INFO : PRELOADER Level : CORRECT DA required : PL/PL_CRYPTO/SWSEC Error : Fail to init protocol! >>> Remove battery, cable. Check cable/connection/driver! Check SW hint! Repeat operation! Reconnect Power/Cable! |
Vivo patched crash preloader and patched brom by keys Need find and connect tp for brom mode |
Hello, Please Select vivo sec_6765 do service in preloader mode All vivo model with 6765 can do by this I just Test One Phone with New Security patch it worked:) Operation : Identify [ v2.34 ] Mode : FLASH 1. Make sure device is powered off. Power off, if need. Wait 20 seconds after 2. Insert USB cable in phone Waiting for device connection ... PTFN : MediaTek PreLoader USB VCOM_V1632 (Android) (COM17) MODE : PRELOADER PORT PORT : 17 Waiting BOOT ack ... PRELOADER : ACK confirmed! BROM : Init BROM BROM init passed! CHIP : MT6765 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000 CODE : Cervino TYPE : MODERN [RAPHAEL] BROM : SecLevel : 0x00000005 BROM : SecMode : SBC+SDA BROM : BROM|BL : 0xFF|0x03 BROM : PRELOADER PORT AGENT : Vivo : SEC_MT6765 | Manual : Disabled AGENT : Look for suitable BootChain in DA ... AGENT : MTK_AllInOne_DA.bin AGENT : Found MT6765 AGENT : MTK_DOWNLOAD_AGENT BROM : Sending 1st DA ... BROM : DA sent BROM :Transfer control to DA ... DA : AGENT started! DA : SYNC DA : MODE : PRELOADER DA : EXT_RAM initialized! DA : BOOT to 2nd DA ... DA : 2ND stage confirmed! DA : SYNC with DA passed! DA : Receiving HW info SRAM: 0x00040000 [ 256.00 KB ] DRAM: 0x30000000 [ 768.00 MB ] EMMC: CID : 150100525036344D4201FCAED01E7655 EMMC: VEN : SAMSUNG : OEM : 0 : ID : 525036344D42 : PRV : 0x01 EMMC: VEN : SAMSUNG : RP64MB EMMC: SNN : 4239314974 ( 0xFCAED01E ) , MF : 7/2019 EMMC: BOOT1 : 0x00400000 [ 4.00 MB ] BOOT2 : 0x00400000 [ 4.00 MB ] RPMB : 0x01000000 [ 16.00 MB ] USER : 0xE8F800000 [ 58.24 GB ] CHIP : MT6765 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000 , EVOL : 0x0000 RNID : 10936BE5176BB926F4FE522B9513E44B DA : USB : HIGH-SPEED Boot done! Product Brand : vivo Product Device : 1901 Product Model : vivo 1901 Product Name : 1901 Patch Level : RP1A.200720.012 Display ID : RP1A.200720.012 release-keys Product Info : k62v1_64_bsp Ver. CodeName : REL Ver. Release : 11 Sec. Patch : 2022-02-01 Build Time : 18.02.2022 Product Board : k62v1_64_bsp Board Platform : mt6765 Product Manfct : vivo USERDATA : FILESYSTEM : EXT4 with FDE ( Full Disk Encryption **) NVRAM : BBK_R0MP1_K62V1_64_BSP_MDBIN_PCB01_MT6765_S00.MOLY _LR12A_R3_MP_V136_6_P74 NVRAM : 0xB50AF66F NVRAM : State : Ok! INFO : WiFi MAC : AA0036004400 INFO : BlTh MAC : 08B3AFD1F27E INFO : IMEI[1] : 862564xxxxxxxxxx INFO : IMEI[2] : 862564xxxxxxxxxx Backup sensetive data [ 18 ] Backup path : Backup\MT6765__10936BE5176BB926F4FE522B9513E44B\ [29] Read : NVRAM [8] Read : NVDATA [19] Read : PROINFO [30] Read : LK [7] Read : NVCFG [14] Read : PROTECT1 [1] Read : PGPT [17] Read : PERSIST [0] Read : PRELOADER Backup done! STORAGE : Life Status : eMMC : NOT implemented in selected DA! STORAGE : OTP Status : NOT Enabled! STORAGE : RPMB Status : eMMC : RPMB KEY PROGRAMMED [UNUSABLE] Done! Elapsed: 00:00:26 |
Quote:
It has MT6768 chip Code: CHIP : MT6768 , SBID : 0x8A00 , HWVR : 0xCA00 , SWVR : 0x0000 Br xerraco |
@xerraco Hello, if u want to Unlock / Reset Pattern or Pascode try Meta Mode & Bypass FRP |
use da free on internet |
Quote:
|
Quote:
If you have good working tested files pls post link here. |
Plz vivo mtk 6768 android 12 add |
Quote:
Br, xerraco |
All times are GMT +1. The time now is 20:22. |
vBulletin Optimisation provided by
vB Optimise (Pro) -
vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -