Quantcast
Channel: MobileRead Forums - Kindle Developer's Corner
Viewing all 4453 articles
Browse latest View live

Placeholder for PW4 jailbreaking notes - reminder - DO NOT UPDATE

$
0
0
Reserved post #1

If there is a chance that the 4 can be jailbroken the same way as the 3, then it will be important that you do not update. The current 3 jailbreak requires you to be a brand new kindle that has never received a "wild" update.



Edit:

According to what I can see, the PW4 is able to be jailbroken the same way as the PW4. It will take some time to verify this, but at first glance I would expect it to follow the same rules

The 'factory' install method may only work on brand new out-of-the box kindles that have never received a software update.

Common fall damage problems?

$
0
0
Hello all.

Got gifted a Kindle Touch by a friend, and after some water damage I had to replace the PCB, it worked nicely, even after jail breaking and re-flashing the kernel, until I dropped from about coat pocket height.

After that it's been unresponsive to anything. Only way I can get any response is to plug in the power, which turns on the orange LED and if I hold the power switch while charging the LED turns off after 1 min and back on when the button is released.

:furious3:
Only had it working again for 2 days!

I even put in the old MB to test and it 'turned on' to it's usual "Your kindle need repair" screen.

I ask, does anyone have any idea what might have broken on the board to cause this?

I think I'm going to order a new PCB any because god hates me, and that's really the only thing I can do at this point... But I thought I'd ask here if anyone has any ideas.

PW2 Kindle stuck on boot screen after upgrade

$
0
0
I haven't used my Kindle PW2 for 2 years, I decided to give it a second life recently by upgrading to the latest firmware, however I forgot it has been jailbroken before.

Now it got stuck on boot screen, I tried below option in the recovery menu
I. Initialize Partition Table (fdisk) and format FAT
and then
E. Export FAT partition
I put an older version of update.bin file in the FAT partition, safely ejected Kindle, disconnected the USB cable and rebooted it, it indeed looked like the upgrade was completed successfully, but it still got stuck on the boot screen again like the beginning.

Not sure about what to do next, kindly any ideas on this, thanks in advance!

Code:

U-Boot 2009.08-lab126 (Oct 12 2018 - 06:10:48)

CPU: Freescale i.MX6 family TO0.0 at 996 MHz
Temperature:  33 C, calibration data 0x5a251a5f
mx6sl pll1: 996MHz
mx6sl pll2: 528MHz
mx6sl pll3: 480MHz
mx6sl pll8: 50MHz
ipg clock    : 66000000Hz
ipg per clock : 66000000Hz
uart clock    : 80000000Hz
cspi clock    : 60000000Hz
ahb clock    : 132000000Hz
axi clock  : 198000000Hz
emi_slow clock: 22000000Hz
ddr clock    : 396000000Hz
usdhc1 clock  : 198000000Hz
usdhc2 clock  : 198000000Hz
usdhc3 clock  : 198000000Hz
usdhc4 clock  : 198000000Hz
MMC:  FSL_ESDHC: 0,FSL_ESDHC: 1,FSL_ESDHC: 2
Board: Pinot WFO
Boot Reason: [ POR ]
Boot Device: NAND
Board Id: 0272201144240DC5
S/N: 905A220144330ED6
I2C:  ready
DRAM:  256 MB
Using default environment

In:    serial
Out:  serial
Err:  serial
Quick Memory Test 0x80000000, 0xfff0000
POST done in 57 ms
BOOTMODE OVERRIDE: DIAGS
Battery voltage: 4150 mV

Hit any key to stop autoboot:  0
## Booting kernel from Legacy Image at 80800000 ...
  Image Name:  Linux-3.0.35-lab126
  Image Type:  ARM Linux Kernel Image (uncompressed)
  Data Size:    2426044 Bytes =  2.3 MB
  Load Address: 80008000
  Entry Point:  80008000
  Verifying Checksum ... OK
  Loading Kernel Image ... OK
OK

Starting kernel ...

[    0.095401] boot: C def:bcut:batterycut=1
[    0.268238] LPDDR2 MfgId: 0x1 [Samsung]
[    0.272131]
[    0.272134] just text: vaddr 0xc011e9bc, va 0xc011e200 pa 0x801000c3 attr 0x6
[    0.280603]
[    0.280606] nmx6sl_wfi_iram: vaddr 0xd081a000, va 0xd081a200 pa 0x902043 attr 0x2
[    0.289588]
[    0.289590] mx6sl_ddr: vaddr 0xd0852000, va 0xd0852200 pa 0x903043 attr 0x2
[    0.298042]
[    0.298045] mx6sl_iomux: vaddr 0xf40e0000, va 0xf40e0200 pa 0x20110c3 attr 0x149
[    0.306937]
[    0.306940] ANATOP: vaddr 0xf40c8000, va 0xf40c8200 pa 0x20110c3 attr 0x149
[    0.315397]
[    0.315399] CCM: vaddr 0xf40c4000, va 0xf40c4200 pa 0x20110c3 attr 0x149
[    0.323596]
[    0.323598] MMDC_P0: vaddr 0xf41b0000, va 0xf41b0200 pa 0x21110c3 attr 0x149
[    0.332143]
[    0.332145] L2: vaddr 0xf2a02000, va 0xf2a02200 pa 0xa02043 attr 0x149
[    0.340169]
[    0.340172] arm perif: vaddr 0xf2a00000, va 0xf2a00200 pa 0xa00043 attr 0x149
3.0.35-lab126 #1 Wed Apr 23 01:26:01 PDT 2014 armv7l
Press [ENTER] for recovery menu...      0 /
Charge: 100% [##########################################################]


Menu
====
3. Load MMC0 over USB storage
4. Erase MMC0
I. Initialize Partition Table (fdisk) and format FAT
O. Format and overwrite FAT partition
E. Export FAT partition
U. Update using update*.bin file on FAT partition
M. Update using update*.bin file on FAT partition of second MMC port
D. dmesg / kernel printk ring buffer.
Q. quit
Choose:  1 -
Menu timeout
BOOTING DEFAULT.
IP-Config: no devices to configure
kinit: Mounted root (ext3 filesystem) readonly.
info sytem:mounted_proc::
info system:mounted_sys::
info system:sy00::
info system:mounted_dev::
info milestone:17.89:49.1:
info milestone:17.92:49.2:
info milestone:17.94:49.3:
info milestone:17.99:49.4:
info milestone:18.03:49.5:
info sytem:mounted_tmpfs::
info milestone:18.11:sy50:
info system:start:time=18140:
info hardware:no_wan::WiFi only device. No WAN found
info system:config:platform=wario,board=pinot,rev=22,proto=Y,wifi=Y,wan=N:
info milestone:18.29:sy51:
lipc-send-event[829]: W def:lipc:method=LipcOpenEx service=com.lab126.hal:Method has been deprecated.
lipc-send-event[823]: W def:lipc:method=LipcOpenEx service=com.lab126.hal:Method has been deprecated.
lipc-send-event[823]: E lipc:con::Connection error(Failed to connect to socket /var/run/dbus/system_bus_socket: No such file or directory)
lipc-send-event[829]: E lipc:con::Connection error(Failed to connect to socket /var/run/dbus/system_bus_socket: No such file or directory)
lipc-send-event[829]: C def:dbusi::Failed to init dbus
lipc-send-event[829]: E def:open::Failed to open LIPC
lipc-send-event[829]: E def:fail:source=com.lab126.hal, event=usbPlugIn:Sending event failed
lipc-send-event[823]: C def:dbusi::Failed to init dbus
lipc-send-event[823]: E def:open::Failed to open LIPC
lipc-send-event[823]: E def:fail:source=com.lab126.hal, event=usbPlugIn:Sending event failed
info milestone:19.19:sy99:
info system:done:time=19210:
crond[854]: crond: crond (busybox 1.17.1) started, log level 8
init.exe: sshd main process (853) terminated with status 2
init.exe:  main process endedinit.exe: recevent pre-start process (857) terminated with status 1
info milestone:19.46:sc01:
info system_fs_loopbacks:mountingfs:Mounting compressed directories filesystem images:
info milestone:19.49:sc02:
info milestone:19.53:/usr/share/X11/xkb:
info system_fs_loopbacks:mounted:Image /usr/share/X11/xkb.sqsh mounted:
info milestone:19.57:3:
info milestone:19.58:sc05:
info milestone:19.59:/usr/java/lib/fonts:
info system_fs_loopbacks:mounted:Image /usr/java/lib/fonts.sqsh mounted:
info milestone:19.64:4:
info milestone:19.64:sc05:
info milestone:19.66:/etc/kdb.src:
info system_fs_loopbacks:mounted:Image /etc/kdb.src.sqsh mounted:
info milestone:19.70:5:
info milestone:19.70:sc05:
info milestone:19.72:/usr/lib/locale:
info system_fs_loopbacks:mounted:Image /usr/lib/locale.sqsh mounted:
info milestone:19.75:6:
info milestone:19.76:sc05:
info milestone:19.78:/usr/share/keyboard:
info system_fs_loopbacks:mounted:Image /usr/share/keyboard.sqsh mounted:
info milestone:19.88:7:
info milestone:19.89:sc05:
info milestone:19.90:/opt/var/local:
info system_fs_loopbacks:mounted:Image /opt/var/local.sqsh mounted:
info milestone:19.95:8:
info milestone:19.95:sc05:
info milestone:19.96:sc07:
info system:emiting_event:mounted_fs_loopbacks:
debug sytem:event_emitted:mounted_fs_loopbacks:
info milestone:20.01:fs75:
info system:emiting_event:loaded_modules_dependencies:
debug sytem:event_emitted:loaded_modules_dependencies:
info modules:modprobe:loading module fsl_otg_arc:
[  20.068785] fsl_otg_arc: version magic '3.0.35-lab126 preempt mod_unload ARMv7 p2v8 ' should be '3.0.35-lab126 mod_unload ARMv7 p2v8 '
crit modules:modprobe_failed:failed to load module fsl_otg_arc:
info modules:modprobe:loading module ehci_hcd:
[  20.097511] fsl_otg_arc: version magic '3.0.35-lab126 preempt mod_unload ARMv7 p2v8 ' should be '3.0.35-lab126 mod_unload ARMv7 p2v8 '
[  20.120497] ehci_hcd: version magic '3.0.35-lab126 preempt mod_unload ARMv7 p2v8 ' should be '3.0.35-lab126 mod_unload ARMv7 p2v8 '
crit modules:modprobe_failed:failed to load module ehci_hcd:
info modules:modprobe:loading module fuse:
[  20.159607] fuse: version magic '3.0.35-lab126 preempt mod_unload ARMv7 p2v8 ' should be '3.0.35-lab126 mod_unload ARMv7 p2v8 '
crit modules:modprobe_failed:failed to load module fuse:
info hardware:no_wan::WiFi only device. No WAN found
info system:emiting_event:loaded_ppp_async:
debug sytem:event_emitted:loaded_ppp_async:
info system:emiting_event:loaded_fakekey:
debug sytem:event_emitted:loaded_fakekey:



Welcome to Kindle!

kindle login:

PW3 PW3 G090G1 Bootloop ???

$
0
0
Hello, everybody,

Today, after a long time without reading or using my Kindle, I took the device and was without battery, 0% battery, I connected my Kindle by USB to a charger, the device was started as a display on the screen.

Can anyone tell me why this happened?

The PW3 G090G1 device had the FW 5.9.4 and jailbreak.

Can someone help me?

I'm sorry for my bad communication.

Thanks

Attached Thumbnails
Click image for larger version

Name:	photo5983210063092887473.jpg
Views:	N/A
Size:	97.3 KB
ID:	167482  

PW3 Can brand new PW3-32G shipped with 5.9.6.1 be jailbroken without opening it or TAOBAO

$
0
0
Can brand new PW3-32G shipped with 5.9.6.1 be jailbroken without opening it or TAOBAO?
Someone beaking GPL in TAOBAO said that he can downgrade it without opening it.

All New Paperwhite (10th Generation) Teardown

$
0
0
It looks like the new Paperwhite has a serial port. See attached photo. It is also very easy to replace the battery, and it is the easiest Kindle to take apart.

Attached Thumbnails
Click image for larger version

Name:	20181108_094238 (Medium) (Small).jpg
Views:	N/A
Size:	118.6 KB
ID:	167529  

Jailbreaking a new Kindle Voyage

$
0
0
Hi

Sorry but I would be grateful for some help in jailbreaking a new Kindle Voyage.

A long time ago I jailbroke a PW2 but not long ago it developed a problem with the USB connection so I have just bought a new Voyage from Amazon in preference to the new PW.

I have tried to follow the various posts but, being somewhat of a novice in all this, I am worried about the comments about recent firmware preventing jailbreaking.

The installed firmware is 5.8.7.0.1 so, if I understand correctly, I should be able to jailbreak it.

I believe Amazon registered it to my account but I have not connected it to wifi and have turned on airplane mode so that it would not update the firmware OTA.

As an aside, I have bought hardly any books from Amazon and virtually all my books will be sideloaded when I have got it working.

What I am planning to do is

1. Charge fully.
2. Reset.
3. Create the folder update.bin.tmp.partial at top level.
4. Add factory_KV_5.5.0_initial to top level and Update Your Kindle.
5. Copy main-htmlviewer.tar.gz to /mnt/us/ and in search bar, type ;installHtml and press return.
6. Copy Update_jailbreak_hotfix_1.15.N_install.bin to root and Update Your Kindle.

Does that all look right?

Then I am supposed to be able to update the firmware. The current version available from Amazon is 5.10.1.1. Is it safe to use that one or do I need to find something lower?

TIA

Tutorial Factory image Jailbreaking brand new Paperwhite 4 ( 2018 ) ( Wifi Only tested )

$
0
0
Hello all,

I am prepared to put the details out for the factory image jailbreak for the paperwhite 4.

I am not interested at this time in maintaining these instructions as software versions change, so I will simply write my method, and allow others who want to maintain it, or add it to the wiki to feel free to do so.


Because of that my instructions will not be in depth.
It does follow the same flow as the existing factory image jailbreak for older devices, the current wiki article is here: https://wiki.mobileread.com/wiki/5_x_Jailbreak


The process should be identical to the method used on PW3 and KOA2. Though my Step #s will not match

Step 0, start up brand new kindle, and skip the wifi screen, choosing to finish setup later.

Step 1: download factory image to your computer, and load onto the kindle

I will host the factory image for a while, and let it get mirrored out to the internet here:
The md5sum is
Code:

2643277e8316ff412fc748ede22c08c6  update_kindle_all_new_paperwhite_v2_5.10.0.1_factory.bin
http://kindle.ficfeed.com/update_kin....1_factory.bin

-- Note here: if you are familiar with usbnet, it appears that amazons usbnet is functional in this build, and you can do the rest of the work manually if you would prefer, instead of using the following images, but you have to support yourself on that. -


Step 2: use Update your kindle in the settings menu
This step will have your kindle processing and on the tree screen for a long time perhaps 30 minutes, do not reboot or try anything during this time
Make sure your kindle is fully powered up before you do this.

Step 3: create the update blocking folder
After that, please create an empty folder on the kindle USB drive named 'update.bin.tmp.partial'

Step 4: Jailbreak your kindle
After that, you can run the jailbreak using the K5 Factory JailBreak (Factory FW) from here https://www.mobileread.com/forums/sh...d.php?t=225030

AKA "installHTML". Se existing documentation on running this
Instructions on how to use are here: https://www.mobileread.com/forums/sh...d.php?t=275887

Step 5: Install the hotfix/bridge to keep the kailbreak after update
After that, you can install the hotfix from here
https://www.mobileread.com/forums/sh...postcount=1597

NiLuJe was amazing and got this working really fast.
It is only currently packaged for devices with Serials G000T6 and G000PP.
( wifi 8GB and 32GB )

Version JailBreak-1.15.N-FW-5.x-hotfix.zip
Post Edit date after Nov 8, 2018


Step X: update to newer Os or do whatever else you want on your jailbroken kind.


Most software will probably not be updated for this yet


This should give you the basic setup if I did not break anything.

There is always a chance that you could be bricked, so be prepared.

This has only been tested on Wifi 8GB and Wifi 32GB with serials that start with G000T6 and G000PP.

This has only been tested on devices that shipped with 5.10.0.1 (3337430015)

Use at your own risk

Kpw2 5.10.1.1 jailbroken

$
0
0
how to jailbroken my KPW2 5.10.1.1 ? Details step.

Thanks so much

KOA2 upgrade KO2 to 5.10.11, JB got a problem

$
0
0
my KO2 is JBed and not installed KUAL, normally I launch xterm from [;log runme --> RUNME.sh] first
then I start my kindle App from xterm command line

yesterday I upgrade my KO2 to 5.10.11,the upgrade is success
but after that, JB got a problem,

I execute [;log runme --> RUNME.sh] to launch xterm ,it does not work any more,
tried to edit RUNME.sh, like:
#!/bin/sh
eips 0 0 "hello world"

execute [;log runme] again, KO2 display "hello world" at left top corrner of screen,
that means, JBed Kindle still can run some command, but can not launch xterm,
Knc1 do you have any idea about this ? could you give a hint to fix it?
thanks!

any kindle system command can convert png file to gif format?

$
0
0
I am working on kindle showing image project,
is that possible to convert a png image to gif format image(no animation) with kindle system internal command?

if some one know about that, please give a hint , thanks!:xmas:

PW2 KUAL not starting on PW2, ssh working

$
0
0
Hi folks,

Some years ago I successfully jailbroke my Kindle PW2, installed KUAL, Backdoor-Lock, Koreader usbnetswitch and other packages. since it is still version 5.4.2 it worked quite well. Many thanks.
I now used it again after a while and first thought about making an update but it sound like it could deactivate the jailbreak. So i decided to install only a new version of koreader. ( i just deleted the old koreader folders in root ).
But after that KUAL wont start again and the device only connects in USBnet-mode to my PC. I can log in via ssh. So deleted the folders again. It didnt help. Then i put the old folder back. It did'nt help. The last thing i did, was to install mkk. But KUAL is still not starting.
(If i click the shop button, a window pops up, telling me, that there is an error opening the content and that i should contact kindle-support -.- )
Everything else seem to work fine.
Does anyone know this problem? How exactly is KUAL startet?

Greetings

PW3 Serial port in Kindle PaperWhite 3

$
0
0
Hello my fellow kids,

I have a Kindle Paperwhite that I bought last year, with firmware 5.9.7 and a serial number G090 G1XX XXXX XXXX that according to your wiki is the Kindle PaperWhite 3 (2015) 7gen, WiFi Edition also called PW3 [1]


These forums are very messy, but they contain very valuable information ... According to what I have read, in the version I am in, you can not jailbreak by Software, so the other option that I have found is to use a serial port , the problem is that, before opening my Kindle, I would like to know if my model has the option of a serial port and if it is the same installation that is discussed here [2] and here [3], I have thought of buying the "USB TTL Serial Cable 1.8V" model TTL-232RG-VREG1V8-WE, ¿it would work with my model?


regards.

[1] - https://wiki.mobileread.com/wiki/Kindle_Serial_Numbers
[2] - https://www.mobileread.com/forums/sh...90&postcount=1
[3] - https://www.mobileread.com/forums/sh...d.php?t=267541

PW3 Successful downgrade 5.8.10.1 -> 5.7.4_initial

$
0
0
Hi, I just wanted to report, successful downgrade attempt on my kindle PW3(G090 G105).
Device never received OTA update, it was registered. Special offers were disabled as per my request by amazon stuff(around 5-6 months ago if it makes any difference). It was in the airplane mode all the time. I didn't do factory reset before upgrade. It was set to English(US), neither parental control nor device passcode were enabled. As in the title, firmware I downgraded from: 5.8.10.1
Firmware I downgraded to: 5.7.4(14f2267189b9ecc51d89e4e86f201e75 update_PW3_5.7.4_initial.bin). After downgrade it looks like special offers were re-enabled.

Kindle jailbreak problem(on initial 5.7.4)

$
0
0
Hi, today I managed to downgrade my kindle(PW3) as described here: https://www.mobileread.com/forums/sh...d.php?t=312637
The problem is, that after following these instructions https://wiki.mobileread.com/wiki/5_x_Jailbreak
(except reflashing the initial firmware part, as I did it, did factory reset tho)
I cannot jailbreak using ;installHtml, nothing happens. Should I reflash the factory image again, and try to follow the instructions again?

Already tried downloading the file using wget, didn't work

Kindle PW4 - Collections from Folders without Jailbreak?

$
0
0
Hello,

i jailbreaked my PW3 since i have it, but the only thing i use it for is creating collections from folders (> 300 books / short stories). My PW4 is on the way, so i like to know if it is possible to do this without JB, maybe some Windows Software or something else. Or is the only way still with JB and KUAL Plugins?

Regards,
Andreas

Has anybody tried installing KIF (Infocom Interpreter) lately?

$
0
0
Resuscitating a topic that seems to be dead for over fuve years, so starting a new thread.

The software is still at https://adq.livejournal.com/108011.html

I have a Kindle Keyboard, running firmware 3.4.2. The first step, jailbreaking, seemed to go OK, but the second update to include kindle-adqdevkeys errors off. I can recover back to the previous, but stuck unless I can add these dev tools.

Any ideas?

Tutorial PW4, 8Gbyte, Wifi Only - factory QC information

$
0
0
Copied from factory QC test log file on device:
Code:

Cmdline:
console=ttymxc0,115200 consoleblank=0 uart_at_4m root=/dev/mmcblk1p8 rootwait quiet secure_cpu=1 androidboot.secure_cpu=1 androidboot.prod=1 androidboot.unlocked_kernel=false

Mounted filesystems:
/dev/root on / type ext3 (ro,noatime,nodiratime,barrier=1,data=ordered)
none on /proc type proc (rw,nosuid,nodev,noexec,relatime)
none on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev type tmpfs (rw,relatime,mode=755)
tmpfs on /dev/shm type tmpfs (rw,relatime)
devpts on /dev/pts type devpts (rw,relatime,gid=5,mode=620)
tmpfs on /var type tmpfs (rw,relatime,size=32768k)
tmpfs on /mnt/kfxcache type tmpfs (rw,relatime,size=256000k)
/dev/loop/2 on /usr/share/X11/xkb type squashfs (ro,noatime,nodiratime)
/dev/loop/3 on /usr/java/lib/fonts type squashfs (ro,noatime,nodiratime)
/dev/loop/4 on /etc/kdb.src type squashfs (ro,noatime,nodiratime)
/dev/loop/5 on /usr/lib/locale type squashfs (ro,noatime,nodiratime)
/dev/loop/6 on /usr/share/keyboard type squashfs (ro,noatime,nodiratime)
/dev/loop/7 on /opt/var/local type squashfs (ro,noatime,nodiratime)
/dev/mmcblk1p3 on /keys type ext3 (ro,noatime,nodiratime,errors=continue,user_xattr,acl,barrier=1,data=ordered)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
/dev/mmcblk1p9 on /var/local type ext3 (rw,relatime,errors=continue,barrier=1,data=ordered)
/dev/loop/0 on /mnt/base-us type vfat (rw,noexec,noatime,nodiratime,fmask=0000,dmask=0000,allow_utime=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro)
fsp on /mnt/us type fuse.fsp (rw,nosuid,nodev,noatime,user_id=0,group_id=0,allow_other)
FQC test OK !

IDME output from same log file:
Code:

IDME:
pcbsn: P001F209836303TB
serial: G000PP07xxxxxxxx
mac: 440049F2DE04
mfg: J7G0QAIKYGIHYTFG89D8
btmac: C495003E19DF
bt_mfg: 0
product_name: 0
productid: 0
productid2: 0
region: US
bootmode: 0
postmode: 0
bootcount: 0
manufacturing:
unlock_code:
oldboot: 0
qbcount: 0
device_type_id: AJRLVDTOPT1LE
vcom: -2530000
fsn: 5271839803492
mfgdate: 20180920
dev_flags: 0
fos_flags: 0
usr_flags: 0
alscal1: 0
alscal2: 0
hwid: 12

Public certificates from same log file:
Code:

DHAv2 key:
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

If someone happens to convert those to ASCII, please post the translation(s).

PW3 5.9.5.1 Jailbreak available?

$
0
0
There's been a long time since I posted here.. ..my PW is on firmware 5.9.5.1
Can I still do a jailbreak on it, or I should just give up, and go for the latest official update?
Thanks

K3 My Clippings.txt-what is deleted?

$
0
0
Hi,
My Clippings.txt holds all highlights in the order in which they were made with no regard to possible delete of the highlight. Once highlighted, the highlighted text stays in the txt.
Neither Calibre nor Kindle Mate appear to address this.
I have read elsewhere here though that this particular issue was resolved some time ago in this sub forum.
If there really is a solution, could anybody kindly point me to it, pls?
Many thanks in advance!
Regards,
PH
Viewing all 4453 articles
Browse latest View live