Ok, this showed up a day or two ago... any idea what it's about?
Anyone have tvapppatches for 11.0n.K1-01-2-652?
I'll put in a $50 USD bounty for someone who does the TiVo app patch and uploads an WinMFS image of a empty drive (no recordings) with 11.0n.K1-01-2-652.
Here are the patches for 11.0n.K1 (Note: I omitted the 30secskip patch as that no longer seems to work, but it can still be enabled via the remote code):
A couple of miscellaneous patches:Code:11.0n.K1 0x005d2990 "104000aa 100000aa" //noencryption 0x00655e44 "30b000ff 00008021" //cci1 0x00655e68 "00e08821 24110000" //cci2 0x00772f58 "00008021 24100001" //backdoors 0x01090c4c "30b000ff 00008021" //cci3 0x009634b8 "12400003 10000003" //deletethisrecording? 0x00ba6afc "0c2e9e36 00000000" //nopauseads
And here's the NoMEK patch - it replaces the generic noencryption patch (above) to allow MRV of encrypted recordings:Code:0x007c4d1c "10400008 10000008" //nothanks 0x0056a4b8 "1200ffaf 1000ffaf" //ignoredrmsig1 0x00597bb0 "1200ff87 1000ff87" //ignoredrmsig2
And finally, the updated bufferhack:Code:11.0n.K1 NoMEK 0x005d298c "92220024 27a40028" 0x005d2990 "104000aa 0c156b35" 0x005d2994 "27a40028 00000000" 0x005d2998 "0c156b35 0c440709" 0x005d29a0 "8fa20020 106000aa" 0x01101bfc "27bdfec8 03e00008" 0x01101c00 "afb40128 24020001" 0x01101c24 "00a0a021 8e230040" 0x01101c28 "0c1b5d0e 10600002" 0x01101c2c "00602821 00000000" 0x01101c30 "00408021 8c630000" 0x01101c34 "1200000a 03e00008" 0x01101c38 "00001021 8fa20020"
The tivoapp I used has the following MD5 hash: 0A5E528A0672237B965090005E10016DCode:set sys(11.0n.K1)[list 0x11464a 0x114316 0x6c 0x1bc5ee 30366736 325F14DAA33CC105AD841D8F73E3E67B7A85EDBF]
These are all untested as of yet, so use at your own peril.
thanks for doing that!
Yeah I was wondering about the 30 sec skip patch myself, I was looking for 14400026 near 0x0079c80c and couldn't find any candidates that seemed "decent".
does anyone recall what the remote codes for 30 sec skip is off the top of their head?
The scary part is how you buy your initial purchase of bitcoin to set up the account, giving them a credit card number. If you are reluctant to do that there are other ways to make that purchase that don't expose your money. Once you have the account and a balance, it couldn't be easier to make and receive payments. Website spells it all out.
Note that I was only able to get bufferhack to work by removing the .J1 patch line
from the bufferhack.tcl patch file. Without removing the .J1 patch line I received the following output from bufferhackCode:set sys(11.0n.J1) [list 0x11465a 0x114326 0x6c 0x1bc5fe 30366736 325F14DAA33CC105AD841D8F73E3E67B7A85EDBF]
and the bufferhack did not work correctly (I had never seen the dual "is supported.." output before).Code:Checking tivoapp version... Your TiVo version is supported (11.0n.K1) Your TiVo version is supported (11.0n.J1)
Also, I set the 30 second skip using the remote technique and it has persisted though reboots.
That makes sense (re: bufferhack) as I believe the script uses the size of the tivoapp to determine the version and both the K1 & J1 tivoapp are exactly the same size.