The UART started streaming raw hex.
He’d found it on an old Russian forum, buried in a ZIP archive dated 2019, next to a text file that simply said: “Works on DDR3. Don’t ask for support.” prog_emmc_firehose_8953_ddr
SECTOR_SIZE: 512 GPT header found. - modem (0x8000) - sbl1 (0x1000) - ddr (0x2000) <--- wait, what? He frowned. DDR? That wasn’t a partition. That was RAM. The UART started streaming raw hex
Sahara: version 0x03 Sahara: sending hello packet... Sahara: device responded. Mode: Firehose Firehose: handshake sent. Firehose: ready. Leo’s heart pounded. The phone’s eMMC was now naked before him. He sent a read command to dump the partition table. prog_emmc_firehose_8953_ddr
The bootloader was locked. The recovery partition was corrupt. Normal doors were welded shut.