I've been using an app I wrote to extract things from the root file system (I've been able to access many configs and script files with it, including switch_init.sh, but it seems to have the permissions of the app user that you mention in your video). But any attempt I've made at getting access to a shell have been no-go.
Exciting I've blocked OTN updates
I explained it in first post:leimeisei wrote:Personally I'd just like to know how you got ANY sort of shell access in the first place
Shell with app user was used ONLY for this video purposes (for example to illustrate app user's limitations). It's NOT required and never will be to fully root J Besides I think you know that once we have root it's game over and we can get ANY "shell"sectroyer wrote:This is advanced rooting method and you will NOT be using same techniques as presented in video. Final rooting app will be simpler. It's just a 'Sneak Peak'.
If you want me to help you please paste FULL log(s) to "spoiler"/"code" bbcodes or provide link(s) to pasted file(s) on http://ctrlv.it/ Otherwise "NO HELP"!!!
If you want root DISABLE internet access to your device!!!!
DO NOT EVER INSTALL FIRMWARE UPGRADE !!!!
(c) bugficks@samygo 2016
Mounting '/opt/apps/111477001268_img/111477001268.img' to '/tmp/tmpAXIXw8'
Copying '/tmp/tmpAXIXw8/RootFS' to '/opt/storage/usb/sda1/spm/RootFS'
Copying '/tmp/tmpAXIXw8/app.json' to '/opt/storage/usb/sda1/spm/app.json'
Decrypting '/tmp/tmpAXIXw8/config.xml.spm' to '/opt/storage/usb/sda1/spm/config.xml'
Decrypting '/tmp/tmpAXIXw8/index.html.spm' to '/opt/storage/usb/sda1/spm/index.html'
Copying '/tmp/tmpAXIXw8/readme.txt' to '/opt/storage/usb/sda1/spm/readme.txt'
Copying '/tmp/tmpAXIXw8/widget.info' to '/opt/storage/usb/sda1/spm/widget.info'
Decrypting '/tmp/tmpAXIXw8/app/init.js.spm' to '/opt/storage/usb/sda1/spm/init.js'
THIS means that he written a lib to decryption Tizen widget files.
UE40F8000 (T-FXPDEUC-1136.0), BD-D5500