Facepalm S-OFF exploit for the HTC EVO 4G LTE released
My Twitter feed for the past few days has been all about Facepalm S-OFF for multiple HTC devices – and finally on Sunday it became available for the HTC EVO 4G LTE.
While the EVO 4G LTE already has S-OFF through Team Unlimited’s DirtyRacun S-OFF exploit, running it requires Windows 7 32-bit or Ubuntu 12.04 32-bit, and on the 3.16.651.x release, you have to run additional programs to prep the phone. While it’s not terribly difficult to make a live-CD (we’ve covered it before) and run your exploits, if you just want to use your existing OS and you have ADB abilities, Facepalm should work regardless of the OS bits.
Unfortunately Facepalm will require an unlocked/rooted EVO 4G LTE, as the HTCDev unlock barrier has not been broken as of yet.
The commands are relatively simple and broken down in pretty easy steps, assuming you’re in possession of a working copy of ADB and Fastboot and are comfortable executing some commands. You’ll download two files, execute a shell command to superCID (change the revision number) and then enter five commands. You should have S-OFF in about two minutes.
It’s a new method, but fairly straightforward and looks to be a little bit less of a pain for prep. However, I’m not really willing to S-ON my phone to S-OFF it with this. I’d advise that unless you’re quite willing to be the guinea pigs for this, wait a day or two before trying it, as it’s pretty darn new. I’ll also note that many many people report that Unlimited’s software works on 64-bit; however, the developers do not support it. Why risk it?
There’s a two minute long video that shows from start to finish what the phone basically looks like executing the exploit, although it’s not a walkthrough of the steps. Have fun!
[xda-developers]