When you get the hash code how would you go about using it to create a file to then unlock or bypass efi without going back and reading and writing the efi chip. For example I have seen you can send certain people the hash code they then go back and send you a file which lets you sign into mac and then no efi and its like it starts it all over fresh to brand new setup screen.
Yes I'm sure. I speculate he is working with somebody at Apple. I'm sure if how to decrypt the hash was leaked, it would be over now and everybody would know.
I don't think he decrypts it. I believe somehow he puts it into a file like a clean dump with a serial number because he ask for both" hash & serial "he said that he does something similar but doesn't explain he then sends you a usb flash drive and you plug it in then it starts right up showing the brand new setup for apple. I am thinking about paying him for 1 just so ill have the file to reverse engineer it
Here is the site that offers it I didn't post the link just a picture showing it but they have tons of other apple efi things on it that Is where I bought all my tools I want to buy the one on here but they are sold out on here
I know the guy who does it ask for both serial and hash and then says he will create the scbo file and you then just plug It in and it bypasses the firmware lock.
I wonder how by changing the file and booting to it that it is able to access the efi location to bypass. I was also told when you do it that it lets you reset it like a brand new mac like you don't have to go in and clean hd and stuff you just pop in flash drive then boot to it then it says setup your new mac etc...
Apple has clearly built in some backdoor access, but as far as I know, that scbo has to be generated by gsx.
I would need a control... to lock a mac of my own and then have the corresponding scbo to compare against this random one... and even then who knows what we may or may not find.
It could be next to impossible if the remaining portion of that file (after the hash) is generated by some algorithm using the hash and the serial
This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.
You have declined cookies. This decision can be reversed.
You have allowed cookies to be placed on your computer. This decision can be reversed.
This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.